{"id":"RHSA-2024:0724","summary":"Red Hat Security Advisory: kernel security and bug fix update","modified":"2026-04-16T10:07:54Z","published":"2024-09-16T17:02:40Z","upstream":["CVE-2021-30002","CVE-2021-34866","CVE-2021-3640","CVE-2021-4204","CVE-2022-0168","CVE-2022-0500","CVE-2022-0617","CVE-2022-1462","CVE-2022-2078","CVE-2022-21499","CVE-2022-23222","CVE-2022-24448","CVE-2022-25265","CVE-2022-2586","CVE-2022-2663","CVE-2022-28388","CVE-2022-28390","CVE-2022-28893","CVE-2022-3524","CVE-2022-3545","CVE-2022-3566","CVE-2022-3594","CVE-2022-3619","CVE-2022-3623","CVE-2022-36946","CVE-2022-3707","CVE-2022-39189","CVE-2022-45887","CVE-2022-49908","CVE-2022-50213","CVE-2022-50272","CVE-2023-0458","CVE-2023-1075","CVE-2023-1252","CVE-2023-1989","CVE-2023-20569","CVE-2023-2166","CVE-2023-2176","CVE-2023-23455","CVE-2023-28328","CVE-2023-28772","CVE-2023-3141","CVE-2023-35825","CVE-2023-40283","CVE-2023-4132","CVE-2023-45862","CVE-2023-46813","CVE-2023-4921","CVE-2023-54270","CVE-2023-5717","CVE-2023-6356","CVE-2023-6535","CVE-2023-6536","CVE-2023-6610","CVE-2023-6817","CVE-2023-6932","CVE-2024-0646"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0724"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000457"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2051444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055499"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2096178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177389"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187813"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187931"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193219"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231800"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244715"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245514"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246944"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253908"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254054"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255283"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0724.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2021/8/28/238"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/07/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4204"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4204"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/11/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-30002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-30002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-30002"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-34866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-34866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-34866"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1148/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0168"},{"type":"ARTICLE","url":"https://starlabs.sg/advisories/22/22-0168/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0500"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0500"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0617"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0617"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1462"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1462"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1462"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q2/155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2078"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2078"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2586"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/08/09/5"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2663"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3524"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3545"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3566"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3566"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3594"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3619"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"},{"type":"ARTICLE","url":"https://vuldb.com/?id.211918"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3623"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3707"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3707"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21499"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21499"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21499"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23222"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23222"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/13/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24448"},{"type":"ARTICLE","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25265"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"},{"type":"ARTICLE","url":"https://github.com/x0reaxeax/exec-prot-bypass"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28390"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28893"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28893"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28893"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/3"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/4"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36946"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36946"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39189"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45887"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45887"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45887"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49908"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49908"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49908"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050104-CVE-2022-49908-ad9a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50213"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2022-50213-bc19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395349"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50272"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50272-4120@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0458"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1252"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1252"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1252"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1989"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2166"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0acc442309a0a1b01bcdaa135e56e6398a49439c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2176"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/linux-rdma/msg114749.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3141"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4132"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4132"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4132"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4921"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4921"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4921"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/8fc134fee27f2263988ae38920bc03da416b03d8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5717"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-5717"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5717"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6356"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6356"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6356"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6535"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6535"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6536"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6610"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6610"},{"type":"ARTICLE","url":"https://bugzilla.kernel.org/show_bug.cgi?id=218219"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6817"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20569"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20569"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20569"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/7049120"},{"type":"ARTICLE","url":"https://www.amd.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf"},{"type":"ARTICLE","url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-23455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-23455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23455"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28328"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28328"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221120065918.2160782-1-zhongbaisong@huawei.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/CAO4mrfcPHB5aQJO=mpqV+p8mPLNg-Fok0gw8gZ=zemAfMGTzMg@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28772"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-35825"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-35825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35825"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40283"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-45862"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45862"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce33e64c1788912976b61314b56935abd4bc97ef"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-46813"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-46813"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46813"},{"type":"ARTICLE","url":"https://bugzilla.suse.com/show_bug.cgi?id=1212649"},{"type":"ARTICLE","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426112"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54270"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54270"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123000-CVE-2023-54270-cdd0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0646"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhev_hypervisor:4.4::el8","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.6::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.91.1.el8_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0724.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}