{"id":"RHSA-2021:4356","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-04-15T10:01:50Z","published":"2024-09-16T05:32:57Z","upstream":["CVE-2019-14615","CVE-2019-15794","CVE-2020-0427","CVE-2020-24502","CVE-2020-24503","CVE-2020-24504","CVE-2020-24586","CVE-2020-24587","CVE-2020-24588","CVE-2020-26139","CVE-2020-26140","CVE-2020-26141","CVE-2020-26143","CVE-2020-26144","CVE-2020-26145","CVE-2020-26146","CVE-2020-26147","CVE-2020-27777","CVE-2020-29368","CVE-2020-29660","CVE-2020-36158","CVE-2020-36312","CVE-2020-36386","CVE-2021-0129","CVE-2021-20194","CVE-2021-20239","CVE-2021-23133","CVE-2021-28950","CVE-2021-28971","CVE-2021-29155","CVE-2021-29646","CVE-2021-29650","CVE-2021-29657","CVE-2021-31440","CVE-2021-31829","CVE-2021-31916","CVE-2021-33033","CVE-2021-33098","CVE-2021-33200","CVE-2021-3348","CVE-2021-3444","CVE-2021-3489","CVE-2021-3564","CVE-2021-3573","CVE-2021-3600","CVE-2021-3635","CVE-2021-3659","CVE-2021-3679","CVE-2021-3732","CVE-2021-4442","CVE-2021-46905","CVE-2021-46983","CVE-2021-47011","CVE-2021-47080","CVE-2022-20166","CVE-2022-50042","CVE-2022-50073","CVE-2023-53578","CVE-2023-53598","CVE-2023-53607"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:4356"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793880"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816493"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1903244"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1906522"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912683"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1913348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1915825"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1919893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921958"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1923636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1930376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1930379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1930381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1933527"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1939341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945345"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1945388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1953847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954588"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1957788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960496"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960500"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960504"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960708"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965038"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1966578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1969489"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1971101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1972278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1974627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1975182"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1975949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976679"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976946"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976969"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977422"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977537"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977850"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1978369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1979070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1979680"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981954"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986138"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1989165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1989999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1996854"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-14615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789209"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-14615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14615"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15794"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15794"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15794"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0427"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0427"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24502"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24502"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24503"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24503"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24503"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24504"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24504"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24504"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24587"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24587"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24587"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24588"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24588"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24588"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26139"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26139"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26139"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26140"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26140"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26140"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26141"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26143"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26143"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26144"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26144"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26144"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26145"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26145"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26146"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26146"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26146"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26147"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26147"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26147"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-27777"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-27777"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27777"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2020/10/09/1"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2020/11/23/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-29368"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-29368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29368"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-29660"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-29660"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29660"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36158"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1947991"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36312"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36312"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36386"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36386"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-0129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-0129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3348"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3348"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3348"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1942667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3444"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3444"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3489"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/05/11/10"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3564"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3564"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3564"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/05/25/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3573"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3573"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3573"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/06/08/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3600"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3600"},{"type":"ARTICLE","url":"https://lore.kernel.org/patchwork/patch/1379497/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/06/23/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3635"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3635"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3659"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3659"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3679"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3732"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4442"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4442"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20194"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20239"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-23133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-23133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23133"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-28950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-28950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28950"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-28971"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-28971"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28971"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29155"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/04/18/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29646"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29650"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29650"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29650"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995153"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29657"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29657"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2177"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31440"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31440"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31829"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31829"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31829"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31916"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31916"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31916"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2021/q1/268"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33033"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1961300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33033"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33098"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33098"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33098"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33200"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33200"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/05/27/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266253"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46905"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46905"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46983"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266906"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46983"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47011"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266847"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47011"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47080"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267533"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47080"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47080"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122089"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373691"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50042"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50073"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373494"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50073"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53578-7dbf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53598"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53598"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53607"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401517"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53607"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53607"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53607-9638@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-348.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:4356.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}