{"id":"RHSA-2024:5365","summary":"Red Hat Security Advisory: kernel-rt security update","modified":"2026-03-18T10:32:29Z","published":"2024-10-01T20:54:31Z","upstream":["CVE-2021-47383","CVE-2023-52448","CVE-2023-52651","CVE-2023-52771","CVE-2023-52864","CVE-2024-21823","CVE-2024-26855","CVE-2024-26897","CVE-2024-27046","CVE-2024-27052","CVE-2024-35789","CVE-2024-35845","CVE-2024-35852","CVE-2024-35907","CVE-2024-35937","CVE-2024-36922","CVE-2024-36941","CVE-2024-36971","CVE-2024-38538","CVE-2024-38555","CVE-2024-38556","CVE-2024-38586","CVE-2024-38627"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5365"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275655"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275742"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281821"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282719"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292331"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293402"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293461"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293700"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5365.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47383"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52448"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022255-CVE-2023-52448-7bf2@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52651"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52651"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52651"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050110-CVE-2023-52651-5907@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52771"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52771"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52771"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052150-CVE-2023-52771-43ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52864"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52864"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52864"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052118-CVE-2023-52864-15cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21823"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-21823"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26855"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26855"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26897"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26897"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26897"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041744-CVE-2024-26897-5382@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27046"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27046"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27046"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27046-4694@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27052"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27052-fb6d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35789"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35789"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35789-52e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35845"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35845"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35845"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051718-CVE-2024-35845-65bd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35852"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35852-9e9a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35907"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35907"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35907"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051954-CVE-2024-35907-32f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35937"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35937"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35937"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36922"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36922"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36922"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36922-f0df@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36941"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36941"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36941"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36941-b3a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36971"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36971"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36971"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240610090330.1347021-2-lee@kernel.org/T"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38538"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38538-e28a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38555"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38555"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38555"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061952-CVE-2024-38555-aefb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38556"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061952-CVE-2024-38556-8afa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38586-70d6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38627"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38627"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38627"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062140-CVE-2024-38627-9b57@gregkh/T"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.2::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.79.1.rt14.364.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:5365.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}