{"id":"RHSA-2024:1404","summary":"Red Hat Security Advisory: kernel security and bug fix update","modified":"2026-03-31T10:03:56Z","published":"2024-09-16T17:03:35Z","upstream":["CVE-2021-43975","CVE-2022-28388","CVE-2022-3545","CVE-2022-3594","CVE-2022-36402","CVE-2022-38096","CVE-2022-38457","CVE-2022-40133","CVE-2022-41858","CVE-2022-45869","CVE-2022-45887","CVE-2022-4744","CVE-2022-50148","CVE-2023-1382","CVE-2023-2166","CVE-2023-2176","CVE-2023-28772","CVE-2023-30456","CVE-2023-31084","CVE-2023-33951","CVE-2023-33952","CVE-2023-40283","CVE-2023-45862","CVE-2023-4921","CVE-2023-51042","CVE-2023-51043","CVE-2023-53421","CVE-2023-5633","CVE-2023-6606","CVE-2023-6610","CVE-2023-6817","CVE-2023-6931","CVE-2023-6932","CVE-2023-7192","CVE-2024-0565","CVE-2024-0646","CVE-2024-1086"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187813"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187931"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231800"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244715"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245514"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253611"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253908"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262126"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1404.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43975"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3545"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3594"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4744"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36402"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36402"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36402"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38096"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38457"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41858"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41858"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41858"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45869"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45869"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45869"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45887"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45887"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45887"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373637"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50148"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-50148-371d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1382"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1382"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1382"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2166"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0acc442309a0a1b01bcdaa135e56e6398a49439c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2176"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/linux-rdma/msg114749.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4921"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4921"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4921"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/8fc134fee27f2263988ae38920bc03da416b03d8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-5633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6606"},{"type":"ARTICLE","url":"https://bugzilla.kernel.org/show_bug.cgi?id=218218"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6610"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6610"},{"type":"ARTICLE","url":"https://bugzilla.kernel.org/show_bug.cgi?id=218219"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6817"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6931"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-7192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-7192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-7192"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28772"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-31084"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-31084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31084"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33951"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33952"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40283"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-45862"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45862"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce33e64c1788912976b61314b56935abd4bc97ef"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51042"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51042"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51043"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51043"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51043"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53421"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53421"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53421-0dd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0565"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/stable-commits/msg328851.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0646"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-1086"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-1086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1086"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660"},{"type":"ARTICLE","url":"https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.51.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:1404.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}