[RHSA-2022:7933] kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)
NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280)
kernel info leak issue in pfkey_register (CVE-2022-1353)
use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)
NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998)
nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)
possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)
Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
use after free in SUNRPC subsystem (CVE-2022-28893)
use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
nf_tables disallow binding to already bound chain (CVE-2022-39190)
nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
- ID
- RHSA-2022:7933
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2022:7933
- Published
-
2022-11-15T00:00:00
(22 months ago) - Modified
-
2022-11-15T00:00:00
(22 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1571
- ALAS-2022-1577
- ALAS-2022-1591
- ALAS-2022-1604
- ALAS-2022-1606
- ALAS-2022-1636
- ALAS-2022-1645
- ALAS-2023-1773
- ALAS2-2021-1727
- ALAS2-2022-1761
- ALAS2-2022-1768
- ALAS2-2022-1793
- ALAS2-2022-1798
- ALAS2-2022-1813
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2022-1888
- ALAS2-2023-2100
- ALAS2-2024-2569
- ALPINE:CVE-2022-21123
- ALPINE:CVE-2022-21125
- ALPINE:CVE-2022-21166
- ALPINE:CVE-2022-23816
- ALPINE:CVE-2022-23825
- ALPINE:CVE-2022-29900
- ALSA-2022:6460
- ALSA-2022:7110
- ALSA-2022:7683
- ALSA-2022:8267
- ALSA-2023:2951
- CISA-2024:0626
- DSA-5092-1
- DSA-5095-1
- DSA-5096-1
- DSA-5127-1
- DSA-5161-1
- DSA-5173-1
- DSA-5178-1
- DSA-5184-1
- DSA-5207-1
- DSA-5257-1
- ELSA-2022-10022
- ELSA-2022-10023
- ELSA-2022-10065
- ELSA-2022-10078
- ELSA-2022-10080
- ELSA-2022-5232
- ELSA-2022-5937
- ELSA-2022-6460
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9260
- ELSA-2022-9264
- ELSA-2022-9265
- ELSA-2022-9266
- ELSA-2022-9267
- ELSA-2022-9270
- ELSA-2022-9271
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9348
- ELSA-2022-9365
- ELSA-2022-9368
- ELSA-2022-9422
- ELSA-2022-9423
- ELSA-2022-9425
- ELSA-2022-9426
- ELSA-2022-9427
- ELSA-2022-9442
- ELSA-2022-9443
- ELSA-2022-9477
- ELSA-2022-9478
- ELSA-2022-9479
- ELSA-2022-9480
- ELSA-2022-9481
- ELSA-2022-9482
- ELSA-2022-9483
- ELSA-2022-9484
- ELSA-2022-9485
- ELSA-2022-9486
- ELSA-2022-9495
- ELSA-2022-9496
- ELSA-2022-9507
- ELSA-2022-9508
- ELSA-2022-9533
- ELSA-2022-9534
- ELSA-2022-9557
- ELSA-2022-9590
- ELSA-2022-9591
- ELSA-2022-9670
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9761
- ELSA-2022-9827
- ELSA-2022-9828
- ELSA-2022-9829
- ELSA-2022-9830
- ELSA-2022-9852
- ELSA-2022-9870
- ELSA-2022-9871
- ELSA-2022-9926
- ELSA-2022-9927
- ELSA-2022-9969
- ELSA-2022-9996
- ELSA-2022-9997
- ELSA-2023-12232
- ELSA-2023-12242
- ELSA-2023-12243
- ELSA-2023-12255
- ELSA-2023-12256
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-2951
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12433
- ELSA-2024-12570
- ELSA-2024-12571
- FEDORA-2022-177a008b98
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-391e24517d
- FEDORA-2022-3e6ce58029
- FEDORA-2022-484e226872
- FEDORA-2022-5cd9d787dc
- FEDORA-2022-80cc9873be
- FEDORA-2022-8269eaf361
- FEDORA-2022-8aab5b5cde
- FEDORA-2022-8e3ac65667
- FEDORA-2022-91633399ff
- FEDORA-2022-925fc688c1
- FEDORA-2022-9bbb1d9b7b
- FEDORA-2022-a0d7a5eaf2
- FEDORA-2022-af492757d9
- FEDORA-2022-c69ef9c1dd
- FEDORA-2022-eb323bcd80
- GLSA-202208-23
- GLSA-202402-07
- MS:CVE-2021-3640
- MS:CVE-2022-0168
- MS:CVE-2022-0617
- MS:CVE-2022-0854
- MS:CVE-2022-1016
- MS:CVE-2022-1048
- MS:CVE-2022-1158
- MS:CVE-2022-1263
- MS:CVE-2022-1353
- MS:CVE-2022-1852
- MS:CVE-2022-1998
- MS:CVE-2022-21123
- MS:CVE-2022-21125
- MS:CVE-2022-21166
- MS:CVE-2022-2153
- MS:CVE-2022-23825
- MS:CVE-2022-24448
- MS:CVE-2022-2503
- MS:CVE-2022-28390
- MS:CVE-2022-28893
- MS:CVE-2022-29581
- MS:CVE-2022-29900
- MS:CVE-2022-3107
- MS:CVE-2022-3108
- MS:CVE-2022-36946
- MS:CVE-2022-39190
- MS:CVE-2023-1095
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:5937
- RHSA-2022:5939
- RHSA-2022:6437
- RHSA-2022:6460
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:8267
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2022:6460
- RLSA-2022:7110
- RLSA-2022:7683
- SSA:2022-031-01
- SSA:2022-129-01
- SSA:2022-237-02
- SSA:2022-333-01
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2021:3361-1
- SUSE-SU-2021:3371-1
- SUSE-SU-2021:3374-1
- SUSE-SU-2021:3401-1
- SUSE-SU-2021:3440-1
- SUSE-SU-2021:3443-1
- SUSE-SU-2021:3459-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1270-1
- SUSE-SU-2022:1283-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1322-1
- SUSE-SU-2022:1326-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1335-1
- SUSE-SU-2022:1369-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1453-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:1569-1
- SUSE-SU-2022:1571-1
- SUSE-SU-2022:1573-1
- SUSE-SU-2022:1575-1
- SUSE-SU-2022:1591-1
- SUSE-SU-2022:1605-1
- SUSE-SU-2022:1629-1
- SUSE-SU-2022:1634-1
- SUSE-SU-2022:1637-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:1783-1
- SUSE-SU-2022:1796-1
- SUSE-SU-2022:1849-1
- SUSE-SU-2022:1859-1
- SUSE-SU-2022:1939-1
- SUSE-SU-2022:1942-1
- SUSE-SU-2022:1945-1
- SUSE-SU-2022:1947-1
- SUSE-SU-2022:1948-1
- SUSE-SU-2022:1955-1
- SUSE-SU-2022:1974-1
- SUSE-SU-2022:2000-1
- SUSE-SU-2022:2006-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2078-1
- SUSE-SU-2022:2079-1
- SUSE-SU-2022:2080-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2116-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2268-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2438-1
- SUSE-SU-2022:2444-1
- SUSE-SU-2022:2446-1
- SUSE-SU-2022:2461-1
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2482-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2696-1
- SUSE-SU-2022:2697-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2710-1
- SUSE-SU-2022:2719-1
- SUSE-SU-2022:2720-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2722-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2732-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2750-1
- SUSE-SU-2022:2759-1
- SUSE-SU-2022:2762-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2779-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2781-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2803-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2827-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3061-1
- SUSE-SU-2022:3064-1
- SUSE-SU-2022:3072-1
- SUSE-SU-2022:3088-1
- SUSE-SU-2022:3108-1
- SUSE-SU-2022:3123-1
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3350-1
- SUSE-SU-2022:3359-1
- SUSE-SU-2022:3366-1
- SUSE-SU-2022:3368-1
- SUSE-SU-2022:3369-1
- SUSE-SU-2022:3370-1
- SUSE-SU-2022:3377-1
- SUSE-SU-2022:3407-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3412-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3432-1
- SUSE-SU-2022:3433-1
- SUSE-SU-2022:3445-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3463-1
- SUSE-SU-2022:3464-1
- SUSE-SU-2022:3465-1
- SUSE-SU-2022:3476-1
- SUSE-SU-2022:3584-1
- SUSE-SU-2022:3585-1
- SUSE-SU-2022:3586-1
- SUSE-SU-2022:3587-1
- SUSE-SU-2022:3599-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3688-1
- SUSE-SU-2022:3693-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3779-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3810-1
- SUSE-SU-2022:3844-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0134-1
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0146-1
- SUSE-SU-2023:0147-1
- SUSE-SU-2023:0148-1
- SUSE-SU-2023:0149-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2024:0113-1
- SUSE-SU-2024:0117-1
- SUSE-SU-2024:0118-1
- SUSE-SU-2024:0120-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2940-1
- USN-5265-1
- USN-5267-1
- USN-5267-3
- USN-5268-1
- USN-5302-1
- USN-5381-1
- USN-5383-1
- USN-5384-1
- USN-5385-1
- USN-5390-1
- USN-5390-2
- USN-5413-1
- USN-5415-1
- USN-5416-1
- USN-5442-1
- USN-5442-2
- USN-5443-1
- USN-5443-2
- USN-5444-1
- USN-5465-1
- USN-5466-1
- USN-5467-1
- USN-5468-1
- USN-5469-1
- USN-5470-1
- USN-5471-1
- USN-5484-1
- USN-5485-1
- USN-5485-2
- USN-5486-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5515-1
- USN-5517-1
- USN-5529-1
- USN-5535-1
- USN-5541-1
- USN-5544-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5580-1
- USN-5582-1
- USN-5590-1
- USN-5594-1
- USN-5599-1
- USN-5602-1
- USN-5616-1
- USN-5621-1
- USN-5622-1
- USN-5623-1
- USN-5624-1
- USN-5630-1
- USN-5633-1
- USN-5634-1
- USN-5635-1
- USN-5639-1
- USN-5640-1
- USN-5644-1
- USN-5647-1
- USN-5648-1
- USN-5650-1
- USN-5652-1
- USN-5654-1
- USN-5655-1
- USN-5660-1
- USN-5667-1
- USN-5668-1
- USN-5677-1
- USN-5682-1
- USN-5683-1
- USN-5703-1
- USN-5706-1
- USN-5727-1
- USN-5727-2
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5729-1
- USN-5729-2
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5774-1
- USN-5854-1
- USN-5856-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6027-1
- USN-6031-1
- USN-6093-1
- USN-6221-1
- USN-6222-1
- USN-6252-1
- USN-6256-1
- USN-6284-1
- USN-6301-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6337-1
- VMSA-2022-0016
- VMSA-2022-0020.2
- XSA-404
- XSA-407
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-modules | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-modules-extra?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-modules-extra | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-kvm?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-kvm | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-devel | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-modules | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-modules-extra?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-modules-extra | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-kvm?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-kvm | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-devel | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-debug-core?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-debug-core | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-rt-core?arch=x86_64&distro=redhat-9.1 | redhat | kernel-rt-core | < 5.14.0-162.6.1.rt21.168.el9_1 | redhat-9.1 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |