{"id":"RHSA-2024:3618","summary":"Red Hat Security Advisory: kernel update","modified":"2026-03-18T10:28:00Z","published":"2024-10-01T20:54:07Z","upstream":["CVE-2019-25162","CVE-2020-36777","CVE-2021-46934","CVE-2021-47013","CVE-2021-47055","CVE-2021-47118","CVE-2021-47153","CVE-2021-47171","CVE-2021-47185","CVE-2022-48627","CVE-2022-48669","CVE-2023-52439","CVE-2023-52445","CVE-2023-52477","CVE-2023-52513","CVE-2023-52520","CVE-2023-52528","CVE-2023-52565","CVE-2023-52578","CVE-2023-52594","CVE-2023-52595","CVE-2023-52598","CVE-2023-52606","CVE-2023-52607","CVE-2023-52610","CVE-2023-54170","CVE-2023-6240","CVE-2024-0340","CVE-2024-23307","CVE-2024-25744","CVE-2024-26593","CVE-2024-26603","CVE-2024-26610","CVE-2024-26615","CVE-2024-26642","CVE-2024-26643","CVE-2024-26659","CVE-2024-26664","CVE-2024-26693","CVE-2024-26694","CVE-2024-26743","CVE-2024-26744","CVE-2024-26779","CVE-2024-26782","CVE-2024-26872","CVE-2024-26892","CVE-2024-26897","CVE-2024-26901","CVE-2024-26919","CVE-2024-26933","CVE-2024-26934","CVE-2024-26964","CVE-2024-26973","CVE-2024-26993","CVE-2024-27014","CVE-2024-27048","CVE-2024-27052","CVE-2024-27056","CVE-2024-27059"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3618"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250843"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265271"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266296"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266446"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266746"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266841"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267038"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267185"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267355"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267509"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267705"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267758"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267804"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268293"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268315"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269856"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270080"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270881"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271469"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272791"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273092"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273223"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273260"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273262"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275655"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278237"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278314"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278409"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278537"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-35576"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3618.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-25162"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-25162"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-25162"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022602-CVE-2019-25162-70ae@gregkh/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36777"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36777"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36777"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-2-gregkh@linuxfoundation.org/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022750-CVE-2021-46934-79c8@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47013"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47013"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47013-034a@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47055"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022950-CVE-2021-47055-6927@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47118"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47118"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024031509-CVE-2021-47118-faf2@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47153"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47153"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032501-CVE-2021-47153-8c75@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47171"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47171"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47171"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032536-CVE-2021-47171-f223@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47185"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47185"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47185"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041033-CVE-2021-47185-c363@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48627"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48627"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48627"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030252-CVE-2022-48627-c7bf@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48669"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050131-CVE-2022-48669-15cf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6240"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6240"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6240"},{"type":"ARTICLE","url":"https://people.redhat.com/~hkario/marvin/"},{"type":"ARTICLE","url":"https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52439"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52439"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52439"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52445"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52445"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52445"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022253-CVE-2023-52445-07a6@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52477"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52477"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52477"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52477-6f20@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52513"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52513"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030251-CVE-2023-52513-5224@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52520"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52520"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52520"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52520-0a4e@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52528"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52528"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52528"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52528-c33b@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52565"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52565-07ce@gregkh/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52578"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52578-50cb@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52594"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52594-9b84@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52595"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52595"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52595"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52595-d018@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52598"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52598"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030646-CVE-2023-52598-d0a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52606"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52606-fdcc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52607"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52607"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52607"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52607-75d1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52610"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52610"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240318100758.2828621-10-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54170"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426038"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54170"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54170"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2023-54170-f1c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0340"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0340"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0340"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-23307"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-23307"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23307"},{"type":"ARTICLE","url":"https://bugzilla.openanolis.cn/show_bug.cgi?id=7975"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-raid/20240112071017.16313-1-2045gemini@gmail.com/#r"},{"type":"ARTICLE","url":"https://patchwork.kernel.org/project/linux-raid/patch/20240112071017.16313-1-2045gemini@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-25744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25744"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26593"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26593"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26593"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022315-CVE-2024-26593-9d89@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26603"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26603"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26603"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022415-CVE-2024-26603-42c2@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26610"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26610"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-42-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26615"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26615"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-47-lee@kernel.org/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26642"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26642"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032150-CVE-2024-26642-3549@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26643"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26643"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032150-CVE-2024-26643-4f9d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26659"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26659"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040222-CVE-2024-26659-e4f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26664"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26664"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040223-CVE-2024-26664-03db@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26693"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26693"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040337-CVE-2024-26693-9c3b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26694"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26694"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040337-CVE-2024-26694-b216@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26743"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040301-CVE-2024-26743-6034@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26744"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040301-CVE-2024-26744-d344@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26779"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040310-CVE-2024-26779-8030@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273468"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26782"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26782"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040458-CVE-2024-26782-71ca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26872"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26872"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26872"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26872-2d38@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26892"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26892"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26892"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26892-809e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26897"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26897"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26897"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041744-CVE-2024-26897-5382@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26901"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26901"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26901"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041745-CVE-2024-26901-34e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26919"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26919"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26919"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26919-5100@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26933"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26933-c18d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26934-e2fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26964"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-26964-54c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26973"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26973"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26973-54a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26993"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26993"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26993-fe52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27014"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27014"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27014-d2dc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27048"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27048"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27048-016f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27052"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27052-fb6d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27056"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27056"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27056"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27056-98c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27059"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27059"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27059"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27059-baaa@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.5.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3618.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}