{
  "schema_version": "1.7.0",
  "id": "RHSA-2023:7424",
  "related": [],
  "upstream": [
    "CVE-2022-40982",
    "CVE-2023-3611",
    "CVE-2023-3776",
    "CVE-2023-4128",
    "CVE-2023-4206",
    "CVE-2023-4207",
    "CVE-2023-4208",
    "CVE-2023-31436"
  ],
  "published": "2024-09-13T21:16:39Z",
  "modified": "2026-03-04T10:06:15Z",
  "summary": "Red Hat Security Advisory: kernel-rt security update",
  "severity": [
    {
      "type": "CVSS_V3",
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
    }
  ],
  "affected": [
    {
      "package": {
        "name": "kernel-rt",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debug-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-debuginfo-common-x86_64",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-doc",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-devel",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-kvm",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "kernel-rt-trace-kvm-debuginfo",
        "ecosystem": "Red Hat:rhel_extras_rt:7",
        "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0:3.10.0-1160.105.1.rt56.1256.el7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2023:7424"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/updates/classification/#important"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/solutions/7027704"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223949"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225097"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225191"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7424.json"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-40982"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40982"
    },
    {
      "type": "ARTICLE",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-3611"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3611"
    },
    {
      "type": "ARTICLE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-3776"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3776"
    },
    {
      "type": "ARTICLE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-4128"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261965"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4128"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-4206"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-4207"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-4208"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4206"
    },
    {
      "type": "ARTICLE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81"
    },
    {
      "type": "ARTICLE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec"
    },
    {
      "type": "ARTICLE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8"
    },
    {
      "type": "ARTICLE",
      "url": "https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4207"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4208"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-31436"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192671"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31436"
    },
    {
      "type": "ARTICLE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d"
    }
  ]
}