{"id":"RHSA-2023:2148","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-31T10:01:59Z","published":"2024-09-16T09:02:20Z","upstream":["CVE-2021-26341","CVE-2021-33631","CVE-2021-33655","CVE-2021-47560","CVE-2021-47592","CVE-2022-1462","CVE-2022-1789","CVE-2022-1882","CVE-2022-20141","CVE-2022-21505","CVE-2022-2196","CVE-2022-2663","CVE-2022-28388","CVE-2022-3028","CVE-2022-33743","CVE-2022-3435","CVE-2022-3522","CVE-2022-3524","CVE-2022-3566","CVE-2022-3567","CVE-2022-3619","CVE-2022-3623","CVE-2022-3625","CVE-2022-3628","CVE-2022-36280","CVE-2022-3640","CVE-2022-36879","CVE-2022-3707","CVE-2022-39188","CVE-2022-39189","CVE-2022-4128","CVE-2022-4129","CVE-2022-41674","CVE-2022-42703","CVE-2022-42720","CVE-2022-42721","CVE-2022-42722","CVE-2022-42896","CVE-2022-43750","CVE-2022-4662","CVE-2022-47929","CVE-2022-48695","CVE-2023-0394","CVE-2023-0461","CVE-2023-0590","CVE-2023-1195","CVE-2023-1382","CVE-2023-2177","CVE-2023-22998","CVE-2023-2513","CVE-2023-52340"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:2148"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107924"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2148.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-26341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-26341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26341"},{"type":"ARTICLE","url":"https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"},{"type":"ARTICLE","url":"https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33631"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2024/q1/65"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33655"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33655"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47560"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283389"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47560"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47560"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47592"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47592"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47592"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1462"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1462"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1462"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q2/155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1789"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1789"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-v8pq-23qj-q7x7"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/05/25/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1882"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1882"},{"type":"ARTICLE","url":"https://git.kernel.org/linus/353f7988dd8413c4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2196"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2196"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2196"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2663"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3028"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3435"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3435"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3522"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3522"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3524"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3566"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3566"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3567"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3567"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3619"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"},{"type":"ARTICLE","url":"https://vuldb.com/?id.211918"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3623"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3625"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3625"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3628"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3628"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3628"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q4/60"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3707"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3707"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4128"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4128"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4662"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4662"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20141"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21505"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21505"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21505"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-33743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-33743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33743"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7&id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/07/05/5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36280"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133450"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36280"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39188"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39188"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"},{"type":"ARTICLE","url":"https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39189"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41674"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41674"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41674"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/10/13/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42703"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42703"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42703"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42720"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42720"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42721"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42722"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42722"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42722"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42896"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42896"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42896"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-43750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-43750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-43750"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-47929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-47929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-47929"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48695"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48695"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0394"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0394"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/18/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0461"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0590"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0590"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1195"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1195"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1382"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1382"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1382"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2177"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2513"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-22998"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-22998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22998"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52340"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52340"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52340"},{"type":"ARTICLE","url":"https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.rt14.296.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2148.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}