{"id":"RHSA-2024:4554","summary":"Red Hat Security Advisory: kernel-rt security update","modified":"2026-03-18T10:30:22Z","published":"2024-10-01T05:15:20Z","upstream":["CVE-2021-47548","CVE-2021-47596","CVE-2022-48627","CVE-2023-52638","CVE-2024-26583","CVE-2024-26585","CVE-2024-26720","CVE-2024-26783","CVE-2024-26801","CVE-2024-26852","CVE-2024-35857","CVE-2024-35898","CVE-2024-35969","CVE-2024-36005","CVE-2024-36016","CVE-2024-36886"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4554"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267509"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273082"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281669"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281900"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283401"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283894"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293230"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4554.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47548"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47548"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47548"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052441-CVE-2021-47548-e9c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47596"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47596"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47596"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061920-CVE-2021-47596-cd94@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48627"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48627"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48627"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030252-CVE-2022-48627-c7bf@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52638"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52638"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52638"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040334-CVE-2023-52638-26a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265520"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26583"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26583"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022146-traction-unjustly-f451@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26585"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26585"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26585"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022150-fancy-numerate-94ab@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26720"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26720"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26783"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040458-CVE-2024-26783-68c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26801"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26801"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26801"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26852"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26852-0057@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35857"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35857"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35857"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35857-837c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35898"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35969"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35969"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35969"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35969-4a04@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36005"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36005"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36005"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36005-2336@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36016"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052947-CVE-2024-36016-d30a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36886"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36886"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36886"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/752f1ccf762223d109845365d07f55414058e5a3.1714484273.git.pabeni@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053033-CVE-2024-36886-dd83@gregkh/T/#u"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.73.1.rt14.358.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4554.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}]}