{"id":"RHSA-2018:2948","summary":"Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update","modified":"2026-03-06T10:01:07Z","published":"2024-09-29T17:19:24Z","upstream":["CVE-2017-13166","CVE-2017-16648","CVE-2017-17805","CVE-2017-17806","CVE-2017-18075","CVE-2017-18208","CVE-2017-18344","CVE-2018-1000026","CVE-2018-1000200","CVE-2018-1000204","CVE-2018-10322","CVE-2018-1065","CVE-2018-1068","CVE-2018-10877","CVE-2018-10878","CVE-2018-10879","CVE-2018-10880","CVE-2018-10881","CVE-2018-10882","CVE-2018-10883","CVE-2018-1092","CVE-2018-1094","CVE-2018-10940","CVE-2018-1095","CVE-2018-1118","CVE-2018-1120","CVE-2018-11506","CVE-2018-12232","CVE-2018-13405","CVE-2018-14619","CVE-2018-14641","CVE-2018-3639","CVE-2018-5344","CVE-2018-5390","CVE-2018-5391","CVE-2018-5750","CVE-2018-5803","CVE-2018-5848","CVE-2018-7566","CVE-2018-7757","CVE-2018-8781","CVE-2018-9363"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/3553061"},{"type":"ARTICLE","url":"https://access.redhat.com/security/vulnerabilities/ssbd"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/3658021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1516257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528323"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1533909"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539508"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1541846"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547824"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1548412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550142"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551565"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552048"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1560793"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566890"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1568744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571062"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1573699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1583210"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1589324"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590799"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596806"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596812"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596828"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596842"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596846"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1599161"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610958"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622004"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1623067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1629636"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2948.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-13166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-13166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-16648"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-16648"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16648"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-17805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-17805"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-17806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-17806"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17806"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18208"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18208"},{"type":"ARTICLE","url":"https://lwn.net/Articles/618064/"},{"type":"ARTICLE","url":"https://www.kernel.org/doc/Documentation/filesystems/dax.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18344"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18344"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18344"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1065"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1065"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1065"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1068"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1068"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1068"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1092"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1092"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1094"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1094"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1094"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1095"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1095"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1118"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1118"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1120"},{"type":"ARTICLE","url":"http://seclists.org/oss-sec/2018/q2/122"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-3639"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-3639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3639"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"},{"type":"ARTICLE","url":"https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"},{"type":"ARTICLE","url":"https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5344"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5344"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5344"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5390"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/962459"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/netdev/msg514742.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5391"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5391"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/641765"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5750"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5803"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5803"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5803"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5848"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5848"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5848"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-7566"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-7566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-7566"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-7757"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-7757"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-7757"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8781"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-9363"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-9363"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-9363"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10322"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10877"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10877"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10878"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10878"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10880"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10880"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10881"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10882"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10882"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10883"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10940"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10940"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10940"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-11506"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-11506"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11506"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-12232"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-12232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12232"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-13405"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-13405"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-13405"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14619"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14641"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14641"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14641"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000026"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000026"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000026"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000200"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000200"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000204"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000204"}],"affected":[{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-abi-whitelists","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-abi-whitelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-alt","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-alt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-bootwrapper","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-bootwrapper"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-headers","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"python-perf","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/python-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}},{"package":{"name":"python-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/python-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.0-115.el7a"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:2948.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}