{
  "schema_version": "1.7.0",
  "id": "RHSA-2018:0016",
  "related": [],
  "upstream": [
    "CVE-2017-5715",
    "CVE-2017-5753",
    "CVE-2017-5754"
  ],
  "published": "2024-09-13T12:02:02Z",
  "modified": "2025-11-22T11:26:12Z",
  "summary": "Red Hat Security Advisory: kernel-rt security update",
  "severity": [
    {
      "type": "CVSS_V3",
      "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
    }
  ],
  "affected": [
    {
      "package": {
        "name": "kernel-rt",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debuginfo-common-x86_64",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-doc",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-693.11.1.rt56.639.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2018:0016"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/updates/classification/#important"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2017-5753"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2017-5715"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2017-5754"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0016.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
    },
    {
      "type": "ARTICLE",
      "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
    },
    {
      "type": "ARTICLE",
      "url": "https://meltdownattack.com"
    },
    {
      "type": "ARTICLE",
      "url": "https://spectreattack.com/"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754"
    }
  ]
}