{"id":"RHSA-2023:6901","summary":"Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update","modified":"2026-03-31T10:03:20Z","published":"2024-09-14T03:04:49Z","upstream":["CVE-2021-43975","CVE-2022-28388","CVE-2022-3594","CVE-2022-3640","CVE-2022-38457","CVE-2022-40133","CVE-2022-40982","CVE-2022-42895","CVE-2022-45869","CVE-2022-45887","CVE-2022-4744","CVE-2023-0458","CVE-2023-0590","CVE-2023-0597","CVE-2023-1073","CVE-2023-1074","CVE-2023-1075","CVE-2023-1079","CVE-2023-1118","CVE-2023-1206","CVE-2023-1252","CVE-2023-1382","CVE-2023-1855","CVE-2023-1989","CVE-2023-1998","CVE-2023-2269","CVE-2023-23455","CVE-2023-2513","CVE-2023-26545","CVE-2023-28328","CVE-2023-28772","CVE-2023-30456","CVE-2023-31084","CVE-2023-3141","CVE-2023-31436","CVE-2023-3161","CVE-2023-3212","CVE-2023-3268","CVE-2023-33203","CVE-2023-33951","CVE-2023-33952","CVE-2023-35823","CVE-2023-35824","CVE-2023-35825","CVE-2023-3609","CVE-2023-3611","CVE-2023-3772","CVE-2023-4128","CVE-2023-4132","CVE-2023-4155","CVE-2023-4206","CVE-2023-4207","CVE-2023-4208","CVE-2023-4732"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/7027704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165926"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173403"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173430"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175903"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177389"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193219"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213485"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215835"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215836"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219530"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236982"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6901.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43975"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3594"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4744"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38457"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40982"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40982"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42895"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42895"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42895"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-vccx-8h74-2357"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45869"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45869"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45869"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45887"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45887"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45887"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0458"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0590"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0590"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0597"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0597"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/Yz%2FmfJ1gjgshF19t@hirez.programming.kicks-ass.net/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1073"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=b12fece4c64857e5fab4290bf01b2e0317a88456"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/17/3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1074"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/23/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1079"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1118"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1118"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1206"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1206"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1206"},{"type":"ARTICLE","url":"https://git.kernel.org/linus/d11b0df7ddf1831f3e170972f43186dad520bfcc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1252"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1252"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1252"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1382"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1382"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1382"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1855"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1855"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1989"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1998"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1998"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2269"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2269"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2269"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV@redhat.com/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2513"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2513"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3141"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3161"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3161"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3161"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3212"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3212"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3212"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3268"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3268"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3268"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3609"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3609"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3611"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3611"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3611"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4128"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261965"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4128"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4128"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4206"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4207"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4208"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4132"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4132"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4132"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4206"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4206"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4207"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4207"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4208"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4732"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-23455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-23455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23455"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-26545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-26545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26545"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28328"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28328"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221120065918.2160782-1-zhongbaisong@huawei.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/CAO4mrfcPHB5aQJO=mpqV+p8mPLNg-Fok0gw8gZ=zemAfMGTzMg@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28772"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-31084"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-31084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31084"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-31436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-31436"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31436"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33203"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33951"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33952"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-35823"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-35823"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-35824"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-35824"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35824"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-35825"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-35825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35825"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.5.1.rt7.307.el8_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6901.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}