{"id":"RHSA-2022:8267","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-03-31T10:01:41Z","published":"2024-09-30T20:29:50Z","upstream":["CVE-2020-36516","CVE-2021-3640","CVE-2021-47099","CVE-2021-47103","CVE-2021-47373","CVE-2021-47378","CVE-2021-47455","CVE-2021-47556","CVE-2021-47572","CVE-2021-47580","CVE-2021-47639","CVE-2021-47646","CVE-2021-47649","CVE-2021-47657","CVE-2022-0168","CVE-2022-0617","CVE-2022-0854","CVE-2022-1016","CVE-2022-1048","CVE-2022-1158","CVE-2022-1184","CVE-2022-1263","CVE-2022-1280","CVE-2022-1353","CVE-2022-1679","CVE-2022-1852","CVE-2022-1998","CVE-2022-20368","CVE-2022-20572","CVE-2022-21123","CVE-2022-21125","CVE-2022-21166","CVE-2022-21499","CVE-2022-2153","CVE-2022-23816","CVE-2022-23825","CVE-2022-24448","CVE-2022-2503","CVE-2022-2586","CVE-2022-26373","CVE-2022-2639","CVE-2022-28390","CVE-2022-28693","CVE-2022-28893","CVE-2022-29581","CVE-2022-29900","CVE-2022-29901","CVE-2022-3107","CVE-2022-3108","CVE-2022-3239","CVE-2022-36946","CVE-2022-39190","CVE-2022-42432","CVE-2022-48735","CVE-2022-48738","CVE-2022-48765","CVE-2022-48786","CVE-2022-48866","CVE-2022-48905","CVE-2022-48912","CVE-2022-48918","CVE-2022-48921","CVE-2022-48936","CVE-2022-48943","CVE-2022-49057","CVE-2022-49060","CVE-2022-49066","CVE-2022-49086","CVE-2022-49090","CVE-2022-49093","CVE-2022-49098","CVE-2022-49107","CVE-2022-49109","CVE-2022-49122","CVE-2022-49123","CVE-2022-49129","CVE-2022-49130","CVE-2022-49142","CVE-2022-49145","CVE-2022-49147","CVE-2022-49152","CVE-2022-49153","CVE-2022-49156","CVE-2022-49158","CVE-2022-49160","CVE-2022-49175","CVE-2022-49179","CVE-2022-49180","CVE-2022-49188","CVE-2022-49199","CVE-2022-49215","CVE-2022-49227","CVE-2022-49228","CVE-2022-49229","CVE-2022-49235","CVE-2022-49238","CVE-2022-49247","CVE-2022-49253","CVE-2022-49259","CVE-2022-49263","CVE-2022-49264","CVE-2022-49265","CVE-2022-49268","CVE-2022-49270","CVE-2022-49272","CVE-2022-49281","CVE-2022-49288","CVE-2022-49290","CVE-2022-49291","CVE-2022-49292","CVE-2022-49297","CVE-2022-49306","CVE-2022-49325","CVE-2022-49330","CVE-2022-49332","CVE-2022-49334","CVE-2022-49340","CVE-2022-49343","CVE-2022-49347","CVE-2022-49348","CVE-2022-49349","CVE-2022-49374","CVE-2022-49378","CVE-2022-49389","CVE-2022-49394","CVE-2022-49398","CVE-2022-49404","CVE-2022-49408","CVE-2022-49409","CVE-2022-49411","CVE-2022-49412","CVE-2022-49413","CVE-2022-49418","CVE-2022-49426","CVE-2022-49433","CVE-2022-49440","CVE-2022-49451","CVE-2022-49465","CVE-2022-49504","CVE-2022-49515","CVE-2022-49531","CVE-2022-49534","CVE-2022-49536","CVE-2022-49537","CVE-2022-49538","CVE-2022-49543","CVE-2022-49545","CVE-2022-49557","CVE-2022-49559","CVE-2022-49561","CVE-2022-49584","CVE-2022-49605","CVE-2022-49606","CVE-2022-49615","CVE-2022-49625","CVE-2022-49626","CVE-2022-49663","CVE-2022-49664","CVE-2022-49669","CVE-2022-49671","CVE-2022-49673","CVE-2022-49691","CVE-2022-49695","CVE-2022-49697","CVE-2022-49698","CVE-2022-49707","CVE-2022-49708","CVE-2022-49710","CVE-2022-49732","CVE-2022-50000","CVE-2022-50001","CVE-2022-50027","CVE-2022-50030","CVE-2022-50048","CVE-2022-50084","CVE-2022-50085","CVE-2022-50092","CVE-2022-50095","CVE-2022-50115","CVE-2022-50178","CVE-2022-50179","CVE-2022-50187","CVE-2022-50212","CVE-2022-50213","CVE-2022-50506","CVE-2022-50536","CVE-2023-1095","CVE-2023-2008","CVE-2023-28410","CVE-2023-4387","CVE-2023-53181","CVE-2023-53660"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/6971358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905809"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951971"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2006399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025985"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2028370"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2038794"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2051444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2052312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053991"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054023"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2058395"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2059928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066819"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2070205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2071022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074315"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2076304"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2083580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084125"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2088021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089815"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090237"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2094045"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2095275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2100261"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102319"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2109349"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110576"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115065"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2129152"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8267.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36516"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36516"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36516"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/netdev/msg795642.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2021/8/28/238"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/07/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47099"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267919"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47099"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47103"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267914"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47103"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47103"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030416-CVE-2021-47103-4314@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47373"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47373"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47373"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47378"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47378"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052142-CVE-2021-47378-8e72@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282903"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47455"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283393"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47572"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47572"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052454-CVE-2021-47572-50bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348067"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47639"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2021-47639-9183@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348285"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47646"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2021-47646-d726@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348193"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47649"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022649-CVE-2021-47649-f358@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348201"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47657"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47657"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022650-CVE-2021-47657-6f3d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0168"},{"type":"ARTICLE","url":"https://starlabs.sg/advisories/22/22-0168/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0617"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0617"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0854"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0854"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0854"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1016"},{"type":"ARTICLE","url":"http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q1/205"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1048"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1048"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069793"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1158"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/04/08/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1184"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1263"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/04/07/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1280"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1353"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1353"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1353"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1679"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1852"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1998"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1998"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q1/99"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069736"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2153"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/06/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2503"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2503"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2503"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2586"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/08/09/5"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2639"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2639"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3107"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2127985"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3239"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20368"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20368"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20572"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20572"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21123"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21123"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21125"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21125"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21125"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21499"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21499"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21499"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23816"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23816"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23825"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23825"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24448"},{"type":"ARTICLE","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-26373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-26373"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-26373"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28390"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107465"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28693"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28693"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28893"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28893"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28893"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/3"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/4"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29581"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8"},{"type":"ARTICLE","url":"https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29900"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29900"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29900"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29901"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29901"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29901"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36946"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36946"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39190"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220824220330.64283-12-pablo@netfilter.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182888"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42432"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42432"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-22-1457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293324"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48735"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062001-CVE-2022-48735-32e6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48738"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293321"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48738"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062001-CVE-2022-48738-ecf0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48765"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293344"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48765"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48765"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062009-CVE-2022-48765-ddb8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48786"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071637-CVE-2022-48786-7416@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48866"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48905"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48905"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48905-4c70@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48912"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307165"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48912"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48912"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082215-CVE-2022-48912-3f55@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307171"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48918"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48918"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48921"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307174"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48921"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48921"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082218-CVE-2022-48921-5016@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48936"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48936-9302@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307199"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48943"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48943"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082227-CVE-2022-48943-8e11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348326"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49057"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49057"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49057-94a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348065"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49060"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49060-6210@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49066"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348115"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49066"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022654-CVE-2022-49066-bc68@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49086"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49086"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49090"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348218"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49090"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49090"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2022-49090-c4ae@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347813"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49093"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2022-49093-0ccf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49098"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348148"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49098"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49098"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2022-49098-9755@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347849"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49107"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2022-49107-03bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49109"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347730"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49109"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2022-49109-1b4f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49122"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49122"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49122"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2022-49122-b139@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49123"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348213"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49123"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2022-49123-8a84@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49129"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347839"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49129"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2022-49129-a098@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49130"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348275"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49130"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2022-49130-8e95@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49142"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49142"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49142"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49142-b3b9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348029"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49145"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49145-3c50@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49147"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348106"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49147"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49147"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49147-7f2f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49152"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348324"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49152"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49152"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49152-7f28@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348284"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49153"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49153-972a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49156"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49156-a5c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49158"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49158-64aa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347673"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49160"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49160"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49160-0990@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348314"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49175"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49175"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49175-1b88@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348174"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49179"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49179-9857@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348229"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49180"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49180-ac1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49188"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49188"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022615-CVE-2022-49188-2a10@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49199"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49199"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49199-54e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347654"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49215"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49215"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022620-CVE-2022-49215-8328@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49227"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49227"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49227"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49227-76b1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49228"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49228"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49228"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49228-f915@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348216"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49229"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49229"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49229-2c2e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49235"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49235-52fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348142"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49238"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49238"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49238-3642@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347676"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49247"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49247"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022626-CVE-2022-49247-66c2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49253"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347872"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49253"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49253"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49253-f3d7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348360"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49259"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49259"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49259-00f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348286"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49263"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49263-2e87@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49264"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347695"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49264"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49264"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49264-ca90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49265"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348093"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49265"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49265-11d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348329"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49268"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49268"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49268-4842@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49270"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49270"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49270-c331@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348064"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49272"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49272-4b85@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49281"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49281"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49281"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022631-CVE-2022-49281-4365@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49288"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347877"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49288"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49288-d3cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347727"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49290"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49290-42e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347842"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49291"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49291"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49291-8c67@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49292"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49292-b60c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348157"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49297"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49297"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022625-CVE-2022-49297-2edb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347702"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49306"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2022-49306-a115@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49325"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49325"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49325-a2ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348206"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49330"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49330"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49330-199b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347742"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49332"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49332"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49332-ecf5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347757"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49334"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49334"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49334-7f6b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49340"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49340"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49340"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2022-49340-419b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348095"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49343"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49343"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2022-49343-bddc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347821"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49347"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49347"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2022-49347-6ba6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348038"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49348"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49348"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2022-49348-d5db@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49349"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49349"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49349"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2022-49349-a7f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347724"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49374"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49374"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49374-22a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49378"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49378"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2022-49378-2598@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49389"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347796"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49389"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49389"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022649-CVE-2022-49389-c9ca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49394"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347830"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49394"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022649-CVE-2022-49394-bcce@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49398"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49398"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022650-CVE-2022-49398-9274@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49404"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348266"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49404"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49404"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022651-CVE-2022-49404-9bb3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347761"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49408"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49408"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49408-2973@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49409"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348330"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49409"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49409-b4e3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49411"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347861"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49411"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49411"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49411-63ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348039"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49412"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49412"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49412-8fac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49413"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347682"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49413"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49413"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49413-ae69@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348347"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49418"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49418"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49418-ff01@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347804"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49426"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49426"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49426-313d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348214"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49433"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49433"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2022-49433-5ef1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348108"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49440"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49440"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49440-6751@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347940"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49451"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49451"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2022-49451-5d2f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49465"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347776"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49465"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49465"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2022-49465-c14f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49504"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347710"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49504"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49504"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49504-9b25@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49515"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49515"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49515-61ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49531"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347714"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49531"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49531"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49531-573a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49534"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49534"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49534"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49534-ad11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347847"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49536"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49536-db89@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49537"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49537"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49537-abf2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49538"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49538"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49538-c7b9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348015"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49543"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49543-09f7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49545"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49545"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022615-CVE-2022-49545-4e81@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49557"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348183"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49557"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49557"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49557-f9a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348281"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49559"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49559"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49559-7711@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348159"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49561"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49561"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49561-3e6a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49584"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347764"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49584"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49584"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49584-ceae@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49605"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348215"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49605"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49605"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49605-fef2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348277"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49606"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49606-3753@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347956"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49615"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49615-e815@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49625"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49625-2fa2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348032"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49626"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49626"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49626-e785@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347767"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49663"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49663-2213@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49664"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49664-d3af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49669"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348086"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49669"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022623-CVE-2022-49669-44d5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348040"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49671-62fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49673"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347792"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49673"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49673-0197@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49691"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49691"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49691-004b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347672"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49695"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49695"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49695-59b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49697"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49697"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49697"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49697-db0b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49698"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49698"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49698-9ddd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348100"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49707"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49707-c4b7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49708"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347684"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49708"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49708"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49708-f056@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49710"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49710-0591@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49732"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49732"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49732"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49732-fc0d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50000"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373543"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50000"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50000"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50000-5753@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50001"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373652"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50001"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50001"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50001-51f3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50027"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373520"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50027"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50027"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061837-CVE-2022-50027-fb5c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50030"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50030"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50030"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2022-50030-83c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50048"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373580"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50048"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50048-40d7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50084"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061858-CVE-2022-50084-6b7c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50085"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373463"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50085"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061858-CVE-2022-50085-7e05@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50092"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373527"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50092"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061801-CVE-2022-50092-dcb8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50095"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061802-CVE-2022-50095-981c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50115"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373645"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50115"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50115"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061809-CVE-2022-50115-86c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50178"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50178"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061831-CVE-2022-50178-52a0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373551"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50179"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061832-CVE-2022-50179-92c5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50187"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50187"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50187-ba19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50212"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50212"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2022-50212-1ff1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50213"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2022-50213-bc19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401575"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50506"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50506"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50506-1642@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402257"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50536"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1095"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2008"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2008"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2008"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-441/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4387"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219270"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4387"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4387"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2203831"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28410"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28410"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/3886a86e7e6cc6ce2ce93c440fecd8f42aed0ce7"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53181"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395369"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53181"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53660"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53660"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53660"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100702-CVE-2023-53660-92d3@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-162.6.1.el9_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:8267.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}