{"id":"ALSA-2024:4211","summary":"Important: kernel security and bug fix update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)\n* kernel:TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)\n* kernel: ovl: fix leaked dentry (CVE-2021-46972)\n* kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)\n* kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)\n* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)\n* kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)\n* kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)\n* kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)\n* kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)\n* kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686)\n* kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (CVE-2023-52675)\n* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)\n* kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)\n* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n* kernel: net/bnx2x: Prevent access to a freed page in page_pool (CVE-2024-26859)\n* kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)\n* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)\n* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)\n* kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959)\n* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)\n* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)\n* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)\n* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)\n* kernel: net: ti: fix UAF in tlan_remove_one (CVE-2021-47310)\n\nBug Fix(es):\n\n* Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:AlmaLinux-29783)\n* Temporary values in FIPS integrity test should be zeroized [almalinux-8.10.z] (JIRA:AlmaLinux-35361)\n* AlmaLinux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:AlmaLinux-36048)\n* [AlmaLinux8] blktests block/024 failed (JIRA:AlmaLinux-8130)\n* AlmaLinux8.9: EEH injections results  Error:  Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:AlmaLinux-14195)\n* Latency spikes with Matrox G200 graphic cards (JIRA:AlmaLinux-36172)\n\nFor more details about the security issue(s), including the impact, \n            a CVSS score, acknowledgments, and other related information, refer to the CVE page(s)\n            listed in the References section.","modified":"2026-02-04T03:23:28.907503Z","published":"2024-07-02T00:00:00Z","related":["CVE-2020-26555","CVE-2021-46972","CVE-2021-47073","CVE-2021-47310","CVE-2021-47353","CVE-2021-47356","CVE-2023-5090","CVE-2023-52464","CVE-2023-52560","CVE-2023-52667","CVE-2023-52675","CVE-2023-52686","CVE-2023-52881","CVE-2024-26675","CVE-2024-26735","CVE-2024-26759","CVE-2024-26804","CVE-2024-26826","CVE-2024-26859","CVE-2024-26906","CVE-2024-26907","CVE-2024-26974","CVE-2024-35958","CVE-2024-35959","CVE-2024-35960","CVE-2024-36004"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4211"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26555"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46909"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46972"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47069"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47073"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47236"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47310"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47311"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47353"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47356"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47495"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5090"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52464"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52560"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52615"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52626"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52667"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52675"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52686"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52700"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52703"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52781"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52813"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52835"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52877"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52878"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52881"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26583"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26584"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26585"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26656"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26675"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26735"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26759"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26801"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26804"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26826"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26859"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26906"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26907"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26974"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26982"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27397"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27410"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35789"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35835"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35838"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35845"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35852"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35853"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35854"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35855"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35888"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35890"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35958"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35959"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35960"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36004"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36007"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1918601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2248122"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265800"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2266408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2266831"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267730"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2270093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2271680"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2272692"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2272829"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275604"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275633"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275635"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275733"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2280434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281113"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281251"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281253"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281255"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281311"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281346"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281689"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281920"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281925"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282394"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282471"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282609"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282680"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282902"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282920"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2024-4211.html"}],"affected":[{"package":{"name":"bpftool","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-cross-headers","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-cross-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-debug","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-doc","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-headers","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-tools","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"perf","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}},{"package":{"name":"python3-perf","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:4211.json"}}],"schema_version":"1.7.3"}