{"id":"RHSA-2024:1306","summary":"Red Hat Security Advisory: kernel-rt security and bug fix update","modified":"2026-03-31T10:03:54Z","published":"2024-09-16T17:03:05Z","upstream":["CVE-2022-0480","CVE-2022-3545","CVE-2022-38096","CVE-2022-40982","CVE-2023-1192","CVE-2023-2163","CVE-2023-2166","CVE-2023-2176","CVE-2023-3268","CVE-2023-3390","CVE-2023-3609","CVE-2023-38409","CVE-2023-40283","CVE-2023-4459","CVE-2023-4622","CVE-2023-5717","CVE-2023-6546","CVE-2023-6932","CVE-2023-7192","CVE-2024-0646"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187813"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187931"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213260"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231800"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253908"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267695"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1306.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0480"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0480"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0480"},{"type":"ARTICLE","url":"https://github.com/kata-containers/kata-containers/issues/3373"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3545"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38096"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40982"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/7027704"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40982"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1192"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686fCVE-2023-52"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2163"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2163"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2163"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2166"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0acc442309a0a1b01bcdaa135e56e6398a49439c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2176"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/linux-rdma/msg114749.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3268"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3268"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3268"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3390"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3609"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3609"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4459"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4459"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4622"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4622"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5717"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-5717"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5717"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6546"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6546"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6546"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-7192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-7192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-7192"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-38409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-38409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38409"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40283"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0646"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267"}],"affected":[{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.0::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:rhel_eus:9.0::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-70.93.1.rt21.165.el9_0"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1306.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}