{"id":"RHSA-2024:6206","summary":"Red Hat Security Advisory: kernel security update","modified":"2026-04-16T10:11:50Z","published":"2024-10-02T05:06:50Z","upstream":["CVE-2021-47069","CVE-2021-47385","CVE-2022-48743","CVE-2022-48754","CVE-2022-48757","CVE-2023-52486","CVE-2023-52619","CVE-2023-52881","CVE-2023-52883","CVE-2024-21823","CVE-2024-26720","CVE-2024-26810","CVE-2024-26852","CVE-2024-26853","CVE-2024-26974","CVE-2024-26993","CVE-2024-33621","CVE-2024-35789","CVE-2024-35845","CVE-2024-36017","CVE-2024-36489","CVE-2024-36883","CVE-2024-36904","CVE-2024-36941","CVE-2024-36979","CVE-2024-37356","CVE-2024-38540","CVE-2024-38570","CVE-2024-38586","CVE-2024-38596","CVE-2024-39502","CVE-2024-41076","CVE-2024-41090","CVE-2024-41091"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:6206"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278314"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282355"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284271"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293276"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293300"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293304"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293402"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299336"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300453"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6206.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47069"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47069"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47069"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47069-5797@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47385"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47385"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47385"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48743"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062003-CVE-2022-48743-ee30@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48754"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48754"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48754"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48757"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48757"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48757"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062007-CVE-2022-48757-c816@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52486"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52486"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-27-lee@kernel.org/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52619"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240318102117.2839904-9-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52881"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20231205161841.2702925-1-edumazet@google.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052941-CVE-2023-52881-4283@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52883"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062030-CVE-2023-52883-0069@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21823"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-21823"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26720"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26720"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26810"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26810"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26810"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040548-CVE-2024-26810-4371@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26852"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26852-0057@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26853"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26853"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26853-b549@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26974"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26974-13eb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26993"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26993"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26993-fe52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-33621"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-33621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-33621"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062134-CVE-2024-33621-d3a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35789"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35789"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35789-52e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35845"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35845"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35845"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051718-CVE-2024-35845-65bd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36017"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36017"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36017"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053015-CVE-2024-36017-bf96@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36489"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062136-CVE-2024-36489-7213@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36883"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36904"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053036-CVE-2024-36904-2273@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36941"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36941"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36941"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36941-b3a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36979"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36979"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061945-CVE-2024-36979-b4a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-37356"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-37356"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-37356"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38540"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38540-1d0a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38570"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38570"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38570"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38586-70d6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38596"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38596"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38596"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38596-f660@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-39502"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39502"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39502-afe9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41076"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41076"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41090"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41090"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41090"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2024/07/24/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41091"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41091"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41091"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:rhel_eus:8.8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-477.70.1.el8_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:6206.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}