{"id":"RHSA-2024:8856","summary":"Red Hat Security Advisory: kernel security update","modified":"2026-03-22T10:05:14Z","published":"2024-11-15T18:45:05Z","upstream":["CVE-2022-48773","CVE-2022-48936","CVE-2022-50341","CVE-2023-52492","CVE-2023-53621","CVE-2024-24857","CVE-2024-26851","CVE-2024-26924","CVE-2024-26976","CVE-2024-27017","CVE-2024-27062","CVE-2024-35839","CVE-2024-35898","CVE-2024-35939","CVE-2024-38540","CVE-2024-38541","CVE-2024-38586","CVE-2024-38608","CVE-2024-39503","CVE-2024-40924","CVE-2024-40961","CVE-2024-40983","CVE-2024-40984","CVE-2024-41009","CVE-2024-41042","CVE-2024-41066","CVE-2024-41092","CVE-2024-41093","CVE-2024-42070","CVE-2024-42079","CVE-2024-42244","CVE-2024-42284","CVE-2024-42292","CVE-2024-42301","CVE-2024-43854","CVE-2024-43880","CVE-2024-43889","CVE-2024-43892","CVE-2024-44935","CVE-2024-44989","CVE-2024-44990","CVE-2024-45018","CVE-2024-46679","CVE-2024-46826","CVE-2024-47668"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8856"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278262"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278387"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281669"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293402"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297475"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297508"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297545"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297567"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297568"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298109"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300487"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300508"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305446"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307862"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307865"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307892"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309852"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309853"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311715"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317601"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8856.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48773"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48773"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071628-CVE-2022-48773-9563@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48936"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48936-9302@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50341"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091638-CVE-2022-50341-12c1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52492"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52492"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-33-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53621"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53621"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100710-CVE-2023-53621-b6f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-24857"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-24857"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24857"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26851"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26851"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26851"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26851-4652@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26924"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26924"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26924"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024042420-CVE-2024-26924-4d1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26976"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-26976-60d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27017"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27017"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27017"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27017-d867@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27062"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27062-3291@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35839"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35839"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35839"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-35839-4194@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35898"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35939"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35939"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35939"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051919-CVE-2024-35939-f877@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38540"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38540-1d0a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38541"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38541-53d0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38586-70d6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38608"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38608"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38608"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061920-CVE-2024-38608-4068@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39503"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-39503"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39503"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39503-e604@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40924"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-40924"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40924"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071213-CVE-2024-40924-9b9b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40961"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-40961"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40961"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40961-19bd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-40983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40983"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071201-CVE-2024-40983-e1b1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40984"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-40984"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40984"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071201-CVE-2024-40984-66b2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41009"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41009"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41009"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071715-CVE-2024-41009-cac5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41042"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41042"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41042-c338@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41066"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41066-0a52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41092"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41092"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072953-CVE-2024-41092-8bd7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41093"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41093"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072953-CVE-2024-41093-9d6c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42070"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072952-CVE-2024-42070-b271@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42079"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072955-CVE-2024-42079-a13c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42244"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303512"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42244"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42244"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42244-2346@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42284"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42284"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42284-bbfa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305437"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42292"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42292-5387@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42301"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42301"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42301"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42301-4026@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43854"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305512"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43854"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43854"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43854-5586@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43880"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306374"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43880"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082137-CVE-2024-43880-78ec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43889"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43889"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082600-CVE-2024-43889-4d0b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43892"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43892"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43892"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082604-CVE-2024-43892-584a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44935"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44935"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082642-CVE-2024-44935-3452@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44989"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090446-CVE-2024-44989-8a2d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44990"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44990"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44990"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090446-CVE-2024-44990-6b62@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-45018"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-45018"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45018"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45018-7e30@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46679"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312067"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46679"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46679-3527@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46826"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46826"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46826"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092750-CVE-2024-46826-7b80@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47668"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024100906-CVE-2024-47668-6b53@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.27.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:8856.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}]}