{
  "schema_version": "1.7.0",
  "id": "RHSA-2021:2316",
  "related": [],
  "upstream": [
    "CVE-2020-8648",
    "CVE-2020-12362",
    "CVE-2020-12363",
    "CVE-2020-12364",
    "CVE-2020-27170",
    "CVE-2021-3347"
  ],
  "published": "2024-09-13T22:45:31Z",
  "modified": "2026-02-26T10:03:44Z",
  "summary": "Red Hat Security Advisory: kernel-rt security and bug fix update",
  "severity": [
    {
      "type": "CVSS_V3",
      "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
    }
  ],
  "affected": [
    {
      "package": {
        "name": "kernel-rt",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debuginfo-common-x86_64",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-doc",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.31.1.rt56.1169.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2021:2316"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/updates/classification/#important"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894587"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2316.json"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
    },
    {
      "type": "ARTICLE",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
    }
  ]
}