{"id":"ALSA-2024:5101","summary":"Important: kernel security update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)\n* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)\n* kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)\n* kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)\n* kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)\n* kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)\n* kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)\n* kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)\n* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)\n* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)\n* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)\n* kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658)\n* kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)\n* kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)\n* kernel: dyndbg: fix old BUG_ON in &gt;control parser (CVE-2024-35947)\n* kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)\n* kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)\n* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)\n* kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)\n* (CVE-2023-28746)\n* (CVE-2023-52847)\n* (CVE-2021-47548)\n* (CVE-2024-36921)\n* (CVE-2024-26921)\n* (CVE-2021-47579)\n* (CVE-2024-36927)\n* (CVE-2024-39276)\n* (CVE-2024-33621)\n* (CVE-2024-27010)\n* (CVE-2024-26960)\n* (CVE-2024-38596)\n* (CVE-2022-48743)\n* (CVE-2024-26733)\n* (CVE-2024-26586)\n* (CVE-2024-26698)\n* (CVE-2023-52619)\n\nBug Fix(es):\n\n* AlmaLinux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:AlmaLinux-17678)\n* [AWS][8.9]There are call traces found when booting debug-kernel  for Amazon EC2 r8g.metal-24xl instance (JIRA:AlmaLinux-23841)\n* [almalinux8] gfs2: Fix glock shrinker (JIRA:AlmaLinux-32941)\n* lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:AlmaLinux-33437)\n* [Hyper-V][AlmaLinux-8.10.z] Update hv_netvsc driver to TOT (JIRA:AlmaLinux-39074)\n* Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:AlmaLinux-40167)\n* blk-cgroup: Properly propagate the iostat update up the hierarchy [almalinux-8.10.z] (JIRA:AlmaLinux-40939)\n* (JIRA:AlmaLinux-31798)\n* (JIRA:AlmaLinux-10263)\n* (JIRA:AlmaLinux-40901)\n* (JIRA:AlmaLinux-43547)\n* (JIRA:AlmaLinux-34876)\n\nEnhancement(s):\n\n* [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:AlmaLinux-19723)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.","modified":"2026-02-04T03:42:05.854178Z","published":"2024-08-08T00:00:00Z","related":["CVE-2021-46939","CVE-2021-47548","CVE-2021-47579","CVE-2022-48743","CVE-2023-28746","CVE-2023-52451","CVE-2023-52463","CVE-2023-52619","CVE-2023-52622","CVE-2023-52653","CVE-2023-52658","CVE-2023-52845","CVE-2023-52847","CVE-2023-52864","CVE-2024-21823","CVE-2024-26586","CVE-2024-26669","CVE-2024-26698","CVE-2024-26733","CVE-2024-26802","CVE-2024-26843","CVE-2024-26878","CVE-2024-26921","CVE-2024-26960","CVE-2024-27010","CVE-2024-33621","CVE-2024-35801","CVE-2024-35807","CVE-2024-35876","CVE-2024-35893","CVE-2024-35947","CVE-2024-36886","CVE-2024-36921","CVE-2024-36927","CVE-2024-38596","CVE-2024-39276"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5101"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46939"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47018"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47257"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47284"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47304"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47373"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47408"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47461"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47468"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47491"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47548"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47579"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47624"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48743"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48747"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48757"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28746"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52463"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52469"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52471"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52486"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52530"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52619"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52622"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52623"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52648"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52653"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52658"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52662"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52679"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52707"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52730"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52756"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52762"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52764"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52775"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52777"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52784"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52791"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52796"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52803"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52811"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52832"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52834"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52845"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52847"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52864"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-2201"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25739"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26586"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26614"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26640"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26660"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26686"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26698"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26704"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26733"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26740"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26773"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26802"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26810"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26837"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26840"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26843"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26852"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26853"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26870"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26878"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26908"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26921"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26925"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26940"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26958"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26960"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26961"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27010"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27011"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27019"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27020"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27025"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27065"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27395"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27434"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-31076"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-33621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35790"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35801"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35807"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35810"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35814"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35824"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35847"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35876"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35893"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35896"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35897"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35899"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35900"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35910"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35912"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35924"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35925"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35930"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35937"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35938"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35946"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35947"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35952"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36000"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36005"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36006"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36010"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36017"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36020"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36025"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36270"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36286"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36489"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36886"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36889"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36896"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36904"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36905"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36917"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36921"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36929"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36933"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36940"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36941"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36945"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36950"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36954"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36960"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36971"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36978"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36979"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38555"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38573"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38575"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38596"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38598"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38615"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38627"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39276"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39472"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39476"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39487"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39502"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2263879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2265797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2266341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2266347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2266497"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2266594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2267787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2268118"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2269070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2269211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2270084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2270100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2270700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2271686"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2271688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2272782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2272795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273109"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273236"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273427"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2273654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275565"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275573"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2275928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2277166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2277238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2277840"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278176"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278182"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278218"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278258"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278277"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278535"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2278989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2280440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281054"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281149"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281207"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281510"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281641"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281672"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281675"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281725"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281758"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281819"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281821"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281938"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281968"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2281989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282328"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282373"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282553"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282717"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282719"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282727"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282742"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282763"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282766"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282887"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282896"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282925"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2282950"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2283401"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2283894"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284465"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284477"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284496"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284500"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284571"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2284625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2290408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2292331"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293250"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293276"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293461"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293684"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2293711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2294274"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2295914"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2296067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2297056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2297474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2297511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2297558"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2298108"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2024-5101.html"}],"affected":[{"package":{"name":"bpftool","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-cross-headers","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-cross-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-debug","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-doc","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-headers","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-tools","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"perf","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}},{"package":{"name":"python3-perf","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-553.16.1.el8_10"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:5101.json"}}],"schema_version":"1.7.3"}