{"id":"RHSA-2024:4831","summary":"Red Hat Security Advisory: kernel-rt security update","modified":"2026-04-16T10:11:02Z","published":"2024-10-02T05:06:31Z","upstream":["CVE-2021-47459","CVE-2022-36402","CVE-2022-38457","CVE-2022-40133","CVE-2022-48743","CVE-2023-33951","CVE-2023-33952","CVE-2023-52434","CVE-2023-52439","CVE-2023-52450","CVE-2023-52518","CVE-2023-52578","CVE-2023-52707","CVE-2023-52811","CVE-2023-5633","CVE-2024-1151","CVE-2024-26581","CVE-2024-26668","CVE-2024-26698","CVE-2024-26704","CVE-2024-26739","CVE-2024-26773","CVE-2024-26808","CVE-2024-26810","CVE-2024-26880","CVE-2024-26923","CVE-2024-26925","CVE-2024-26929","CVE-2024-26931","CVE-2024-26982","CVE-2024-27016","CVE-2024-27019","CVE-2024-27020","CVE-2024-27065","CVE-2024-27417","CVE-2024-35791","CVE-2024-35897","CVE-2024-35899","CVE-2024-35950","CVE-2024-36025","CVE-2024-36489","CVE-2024-36904","CVE-2024-36924","CVE-2024-36952","CVE-2024-36978","CVE-2024-38596"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4831"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262241"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265185"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265271"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267758"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267799"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273236"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273405"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278245"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278250"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278258"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278264"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281672"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281942"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282898"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284598"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293687"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4831.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47459"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47459"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052224-CVE-2021-47459-4f79@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36402"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36402"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36402"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38457"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48743"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062003-CVE-2022-48743-ee30@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-5633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33951"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33952"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52434"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52434"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52434"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52439"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52439"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52439"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52450"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52450"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52450"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022256-CVE-2023-52450-48ba@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52518"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52518"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52518"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030251-CVE-2023-52518-bcfa@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52578"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52578-50cb@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52707"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52707"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52707-e048@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52811"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52811"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52811"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52811-2a5f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-1151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-1151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1151"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26581"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022024-uniquely-recluse-d893@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26668"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040235-CVE-2024-26668-636e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26698"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26698"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040338-CVE-2024-26698-36ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26704"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26704"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26704"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040340-CVE-2024-26704-a082@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26739"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040300-CVE-2024-26739-170e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26773"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26773"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26773-a314@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26808"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26808"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26808"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040458-CVE-2024-26808-2df2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26810"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26810"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26810"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040548-CVE-2024-26810-4371@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26880"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26880"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26923"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26923"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26923"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26925"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26925"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26925"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024042421-CVE-2024-26925-7c19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26929"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050122-CVE-2024-26929-07f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26931"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26931-01d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26982"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26982"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26982-8675@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27016"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27016-5114@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27019"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27019"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27019"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27020"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27020"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27065"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27065"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27065"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27065-8c9d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27417"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27417"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27417"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051703-CVE-2024-27417-3841@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35791"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35791"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35791"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051708-CVE-2024-35791-65ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35897"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35897"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35897"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35897-1585@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35899"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35899"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35899"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35899-c56a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35950"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052015-CVE-2024-35950-41bf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36025"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36025"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36025"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053034-CVE-2024-36025-95e0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36489"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062136-CVE-2024-36489-7213@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36904"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053036-CVE-2024-36904-2273@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36924"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36924"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36924"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36924-6326@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36952"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36952-f8f8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36978"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36978"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36978"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061926-CVE-2024-36978-b4b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38596"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38596"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38596"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38596-f660@gregkh/T"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.75.1.rt14.360.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4831.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}