{"id":"RHSA-2022:7933","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-31T10:01:38Z","published":"2024-09-30T20:29:32Z","upstream":["CVE-2020-36516","CVE-2021-3640","CVE-2021-47099","CVE-2021-47556","CVE-2021-47580","CVE-2022-0168","CVE-2022-0617","CVE-2022-0854","CVE-2022-1016","CVE-2022-1048","CVE-2022-1158","CVE-2022-1184","CVE-2022-1263","CVE-2022-1280","CVE-2022-1353","CVE-2022-1679","CVE-2022-1852","CVE-2022-1998","CVE-2022-20368","CVE-2022-20572","CVE-2022-21123","CVE-2022-21125","CVE-2022-21166","CVE-2022-21499","CVE-2022-2153","CVE-2022-23816","CVE-2022-23825","CVE-2022-24448","CVE-2022-2503","CVE-2022-2586","CVE-2022-26373","CVE-2022-2639","CVE-2022-28390","CVE-2022-28693","CVE-2022-28893","CVE-2022-29581","CVE-2022-29900","CVE-2022-29901","CVE-2022-3107","CVE-2022-3108","CVE-2022-3239","CVE-2022-36946","CVE-2022-39190","CVE-2022-42432","CVE-2022-48905","CVE-2022-48918","CVE-2022-48936","CVE-2023-1095","CVE-2023-2008"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/6971358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2051444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2052312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2058395"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2059928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066819"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2070205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2071022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084125"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2088021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089815"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090237"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115065"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2129152"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7933.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36516"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36516"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36516"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/netdev/msg795642.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2021/8/28/238"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/07/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47099"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267919"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47099"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283393"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0168"},{"type":"ARTICLE","url":"https://starlabs.sg/advisories/22/22-0168/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0617"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0617"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0854"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0854"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0854"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1016"},{"type":"ARTICLE","url":"http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q1/205"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1048"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1048"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069793"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1158"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/04/08/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1184"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1263"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/04/07/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1280"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1353"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1353"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1353"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1679"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1852"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1998"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1998"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q1/99"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069736"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2153"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/06/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2503"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2503"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2503"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2586"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/08/09/5"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2639"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2639"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3107"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2127985"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3239"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20368"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20368"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20572"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20572"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21123"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21123"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21125"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21125"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21125"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21499"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21499"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21499"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23816"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23816"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23825"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23825"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24448"},{"type":"ARTICLE","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-26373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-26373"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-26373"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28390"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107465"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28693"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28693"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28893"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28893"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28893"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/3"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/4"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29581"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8"},{"type":"ARTICLE","url":"https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29900"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29900"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29900"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29901"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29901"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29901"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36946"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36946"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39190"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220824220330.64283-12-pablo@netfilter.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182888"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42432"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42432"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-1457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48905"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48905"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48905-4c70@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307171"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48918"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48918"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48936"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48936-9302@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1095"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2008"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2008"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2008"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-441/"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.rt21.168.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7933.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}