{"id":"RHSA-2025:6966","summary":"Red Hat Security Advisory: kernel security update","modified":"2026-04-07T10:06:05Z","published":"2025-05-14T10:05:42Z","upstream":["CVE-2022-48969","CVE-2022-48989","CVE-2022-49006","CVE-2022-49014","CVE-2022-49029","CVE-2022-49747","CVE-2022-49778","CVE-2022-49804","CVE-2022-49815","CVE-2022-50112","CVE-2022-50121","CVE-2022-50159","CVE-2022-50214","CVE-2022-50319","CVE-2022-50421","CVE-2022-50491","CVE-2022-50511","CVE-2022-50614","CVE-2022-50743","CVE-2022-50811","CVE-2023-52672","CVE-2023-52917","CVE-2023-53066","CVE-2023-53117","CVE-2023-53196","CVE-2023-53260","CVE-2023-53261","CVE-2023-53287","CVE-2023-53510","CVE-2023-53519","CVE-2023-53555","CVE-2023-53568","CVE-2023-53595","CVE-2023-53654","CVE-2023-53859","CVE-2023-53989","CVE-2023-54089","CVE-2023-54117","CVE-2023-54230","CVE-2023-54278","CVE-2023-54313","CVE-2023-54322","CVE-2024-27008","CVE-2024-27398","CVE-2024-35891","CVE-2024-35933","CVE-2024-35934","CVE-2024-35963","CVE-2024-35964","CVE-2024-35965","CVE-2024-35966","CVE-2024-35967","CVE-2024-35978","CVE-2024-36011","CVE-2024-36012","CVE-2024-36013","CVE-2024-36880","CVE-2024-36968","CVE-2024-38541","CVE-2024-39500","CVE-2024-40956","CVE-2024-41010","CVE-2024-41062","CVE-2024-42094","CVE-2024-42133","CVE-2024-42253","CVE-2024-42265","CVE-2024-42278","CVE-2024-42291","CVE-2024-42294","CVE-2024-42302","CVE-2024-42304","CVE-2024-42305","CVE-2024-42312","CVE-2024-42315","CVE-2024-42316","CVE-2024-42321","CVE-2024-43820","CVE-2024-43821","CVE-2024-43823","CVE-2024-43828","CVE-2024-43834","CVE-2024-43846","CVE-2024-43853","CVE-2024-43871","CVE-2024-43873","CVE-2024-43882","CVE-2024-43884","CVE-2024-43889","CVE-2024-43898","CVE-2024-43910","CVE-2024-43914","CVE-2024-44931","CVE-2024-44932","CVE-2024-44934","CVE-2024-44952","CVE-2024-44958","CVE-2024-44964","CVE-2024-44975","CVE-2024-44987","CVE-2024-44989","CVE-2024-45000","CVE-2024-45009","CVE-2024-45010","CVE-2024-45016","CVE-2024-45022","CVE-2024-46673","CVE-2024-46675","CVE-2024-46711","CVE-2024-46722","CVE-2024-46723","CVE-2024-46724","CVE-2024-46725","CVE-2024-46743","CVE-2024-46745","CVE-2024-46747","CVE-2024-46750","CVE-2024-46754","CVE-2024-46756","CVE-2024-46758","CVE-2024-46759","CVE-2024-46761","CVE-2024-46783","CVE-2024-46786","CVE-2024-46787","CVE-2024-46800","CVE-2024-46805","CVE-2024-46806","CVE-2024-46807","CVE-2024-46819","CVE-2024-46820","CVE-2024-46822","CVE-2024-46828","CVE-2024-46835","CVE-2024-46839","CVE-2024-46853","CVE-2024-46864","CVE-2024-46871","CVE-2024-47141","CVE-2024-47660","CVE-2024-47668","CVE-2024-47678","CVE-2024-47685","CVE-2024-47687","CVE-2024-47692","CVE-2024-47700","CVE-2024-47703","CVE-2024-47705","CVE-2024-47706","CVE-2024-47710","CVE-2024-47713","CVE-2024-47715","CVE-2024-47718","CVE-2024-47719","CVE-2024-47737","CVE-2024-47738","CVE-2024-47739","CVE-2024-47745","CVE-2024-47748","CVE-2024-48873","CVE-2024-49569","CVE-2024-49851","CVE-2024-49856","CVE-2024-49860","CVE-2024-49861","CVE-2024-49862","CVE-2024-49870","CVE-2024-49875","CVE-2024-49878","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49884","CVE-2024-49885","CVE-2024-49886","CVE-2024-49889","CVE-2024-49904","CVE-2024-49927","CVE-2024-49928","CVE-2024-49929","CVE-2024-49930","CVE-2024-49933","CVE-2024-49934","CVE-2024-49935","CVE-2024-49937","CVE-2024-49938","CVE-2024-49939","CVE-2024-49946","CVE-2024-49948","CVE-2024-49950","CVE-2024-49951","CVE-2024-49954","CVE-2024-49959","CVE-2024-49960","CVE-2024-49962","CVE-2024-49967","CVE-2024-49968","CVE-2024-49971","CVE-2024-49973","CVE-2024-49974","CVE-2024-49975","CVE-2024-49977","CVE-2024-49983","CVE-2024-49991","CVE-2024-49993","CVE-2024-49994","CVE-2024-49995","CVE-2024-49999","CVE-2024-50002","CVE-2024-50006","CVE-2024-50008","CVE-2024-50009","CVE-2024-50013","CVE-2024-50014","CVE-2024-50015","CVE-2024-50018","CVE-2024-50019","CVE-2024-50022","CVE-2024-50023","CVE-2024-50024","CVE-2024-50027","CVE-2024-50028","CVE-2024-50029","CVE-2024-50033","CVE-2024-50035","CVE-2024-50038","CVE-2024-50039","CVE-2024-50044","CVE-2024-50046","CVE-2024-50047","CVE-2024-50055","CVE-2024-50057","CVE-2024-50058","CVE-2024-50064","CVE-2024-50067","CVE-2024-50073","CVE-2024-50074","CVE-2024-50075","CVE-2024-50077","CVE-2024-50078","CVE-2024-50081","CVE-2024-50082","CVE-2024-50093","CVE-2024-50101","CVE-2024-50102","CVE-2024-50106","CVE-2024-50107","CVE-2024-50109","CVE-2024-50117","CVE-2024-50120","CVE-2024-50121","CVE-2024-50126","CVE-2024-50127","CVE-2024-50128","CVE-2024-50130","CVE-2024-50141","CVE-2024-50143","CVE-2024-50150","CVE-2024-50151","CVE-2024-50152","CVE-2024-50153","CVE-2024-50162","CVE-2024-50163","CVE-2024-50169","CVE-2024-50182","CVE-2024-50186","CVE-2024-50189","CVE-2024-50191","CVE-2024-50197","CVE-2024-50199","CVE-2024-50200","CVE-2024-50201","CVE-2024-50215","CVE-2024-50216","CVE-2024-50219","CVE-2024-50228","CVE-2024-50235","CVE-2024-50236","CVE-2024-50237","CVE-2024-50256","CVE-2024-50261","CVE-2024-50271","CVE-2024-50272","CVE-2024-50278","CVE-2024-50282","CVE-2024-50299","CVE-2024-50304","CVE-2024-53042","CVE-2024-53044","CVE-2024-53047","CVE-2024-53050","CVE-2024-53051","CVE-2024-53055","CVE-2024-53057","CVE-2024-53059","CVE-2024-53060","CVE-2024-53070","CVE-2024-53072","CVE-2024-53074","CVE-2024-53082","CVE-2024-53085","CVE-2024-53091","CVE-2024-53093","CVE-2024-53095","CVE-2024-53096","CVE-2024-53097","CVE-2024-53103","CVE-2024-53105","CVE-2024-53110","CVE-2024-53117","CVE-2024-53118","CVE-2024-53120","CVE-2024-53121","CVE-2024-53123","CVE-2024-53124","CVE-2024-53134","CVE-2024-53136","CVE-2024-53141","CVE-2024-53142","CVE-2024-53146","CVE-2024-53152","CVE-2024-53156","CVE-2024-53160","CVE-2024-53161","CVE-2024-53164","CVE-2024-53166","CVE-2024-53173","CVE-2024-53174","CVE-2024-53176","CVE-2024-53190","CVE-2024-53194","CVE-2024-53203","CVE-2024-53208","CVE-2024-53213","CVE-2024-53216","CVE-2024-53222","CVE-2024-53224","CVE-2024-53232","CVE-2024-53237","CVE-2024-53681","CVE-2024-54460","CVE-2024-54680","CVE-2024-56535","CVE-2024-56544","CVE-2024-56551","CVE-2024-56558","CVE-2024-56562","CVE-2024-56566","CVE-2024-56570","CVE-2024-56590","CVE-2024-56591","CVE-2024-56600","CVE-2024-56601","CVE-2024-56602","CVE-2024-56604","CVE-2024-56605","CVE-2024-56611","CVE-2024-56614","CVE-2024-56616","CVE-2024-56623","CVE-2024-56631","CVE-2024-56642","CVE-2024-56644","CVE-2024-56647","CVE-2024-56653","CVE-2024-56654","CVE-2024-56663","CVE-2024-56664","CVE-2024-56667","CVE-2024-56688","CVE-2024-56693","CVE-2024-56729","CVE-2024-56757","CVE-2024-56760","CVE-2024-56779","CVE-2024-56783","CVE-2024-57798","CVE-2024-57809","CVE-2024-57843","CVE-2024-57852","CVE-2024-57879","CVE-2024-57884","CVE-2024-57885","CVE-2024-57888","CVE-2024-57890","CVE-2024-57894","CVE-2024-57898","CVE-2024-57903","CVE-2024-57929","CVE-2024-57931","CVE-2024-57940","CVE-2024-58009","CVE-2024-58064","CVE-2024-58099","CVE-2025-1272","CVE-2025-21646","CVE-2025-21663","CVE-2025-21666","CVE-2025-21668","CVE-2025-21669","CVE-2025-21689","CVE-2025-21694","CVE-2025-21888","CVE-2025-22087","CVE-2025-68179","CVE-2025-71151"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:6966"},{"type":"ARTICLE","url":"https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280464"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281340"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281827"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281829"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281907"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281909"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281912"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281914"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282952"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282955"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2284280"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292324"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297540"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298411"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300437"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307840"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307862"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307871"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307887"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307888"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307889"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307891"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309783"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309838"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309850"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309852"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309863"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311713"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2311719"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312061"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312063"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313054"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313055"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313098"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313102"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313106"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313109"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313134"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313135"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2313148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317584"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320173"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320209"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320210"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320225"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320240"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320245"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320274"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320454"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320462"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320468"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320471"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320475"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320480"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320486"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320489"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320497"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320500"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320501"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320503"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320509"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320510"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320527"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320529"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320531"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320547"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320550"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320552"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320554"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320557"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320562"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320565"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320570"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320571"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320573"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320574"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320576"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320586"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320587"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320596"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320598"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320602"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320610"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320611"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320620"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320635"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320670"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320781"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322072"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322303"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322308"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322310"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322320"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322323"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323909"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323924"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323927"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323929"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323932"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323933"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323938"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323950"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324320"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324324"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324325"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324413"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324419"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324548"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324566"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324599"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324610"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324617"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324853"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324865"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324869"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324874"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324889"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324897"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324899"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2324901"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327182"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327194"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327335"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327344"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327349"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327362"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327365"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327370"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327373"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327888"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327890"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328791"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2328792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329818"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329919"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329927"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329929"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329930"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329935"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2329937"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330346"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330765"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333973"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333977"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333982"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334373"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334384"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334409"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334419"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334430"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334441"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334461"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334469"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334486"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334495"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334501"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334503"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334538"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334542"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334551"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334562"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334573"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334575"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334683"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334809"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2335899"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2335906"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336550"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337113"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337118"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337152"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337328"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337333"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338197"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338858"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339140"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339143"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343173"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344683"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345243"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362882"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-12439"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-28791"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-58641"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-60028"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-61203"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-62339"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-67304"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-71541"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-8810"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-9279"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_6966.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48969"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48969"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48969"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48969-8fe7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48989"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48989-54c3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49006"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49006"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49006-83c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49014"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49014"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49014-1627@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49029"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49029"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49029"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49029-0ffd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49747"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49747"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49747"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49747-f361@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49778"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49778"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49778"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050118-CVE-2022-49778-ea15@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49804"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49804"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49804"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050127-CVE-2022-49804-0866@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49815"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363358"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49815"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49815"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050131-CVE-2022-49815-ebd2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50112"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50112"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50112"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061808-CVE-2022-50112-e37e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50121"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373534"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50121"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061811-CVE-2022-50121-7e33@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50159"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373696"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50159"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50159"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061825-CVE-2022-50159-a387@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373513"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50214"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2022-50214-6569@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50319"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395312"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50319"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50319-6747@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400737"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50421"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50421"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50421-8bdc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50491"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401482"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50491"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50491"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50491-7a8b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50511"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50511"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50511-5d8d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419885"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50614"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50614"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50614-cc88@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50743"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50743-8e63@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50811"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426130"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50811"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50811"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123013-CVE-2022-50811-66f4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52672"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52672"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52672"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051729-CVE-2023-52672-f30c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52917"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52917"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52917"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102100-CVE-2023-52917-f16d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53066"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363718"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53066"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050211-CVE-2023-53066-cba3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53117"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53117"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050229-CVE-2023-53117-09c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53196"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395317"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53196"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53196"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53196-c59a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53260"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395374"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53260"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53260"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53260-2323@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53261"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53261"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53261"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53261-6a1a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53287"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53287"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53287"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091625-CVE-2023-53287-d8cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53510"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400714"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53510"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53510"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53510-9e6a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400734"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53519"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53519"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53519-de9d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53555"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401465"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53555"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53555"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53555-b949@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53568"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401507"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53568"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53568"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53568-0020@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401509"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53595"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53595"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53595-91fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53654"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53654"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100720-CVE-2023-53654-dcad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53859"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420340"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53859"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53859"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120904-CVE-2023-53859-1c16@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53989"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53989"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-53989-1b3b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425125"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54089"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54089"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54089-ddc6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54117"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54117"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54117-e980@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426148"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54230"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54230"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54230-914e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426072"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54278"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54278"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123003-CVE-2023-54278-d4b2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54313"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426085"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54313"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54313"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123036-CVE-2023-54313-f889@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426163"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54322"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54322-34ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27008"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27008"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27008"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27008-5964@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27398"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27398"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27398"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051355-CVE-2024-27398-08ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35891"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35891"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35891"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35891-3a56@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35933"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051917-CVE-2024-35933-cf34@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051917-CVE-2024-35934-c8af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35963"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35963"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35963"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35963-7934@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35964"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35964-25e2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35965"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35965"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35965"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35965-19f1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35966"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052021-CVE-2024-35966-e107@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35967"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35967"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35967"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35967-d111@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35978"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35978"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35978"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-35978-adaa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36011"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36011"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052312-CVE-2024-36011-2a8b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36012"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36012"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36012"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052314-CVE-2024-36012-3062@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36013"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36013"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052314-CVE-2024-36013-0c90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36880"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36880"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024053031-CVE-2024-36880-c961@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36968"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36968"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36968"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-38541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-38541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38541"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38541-53d0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-39500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-39500"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39500"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39500-eba6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-40956"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-40956"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40956"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071224-CVE-2024-40956-b65d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41010"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41010"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-41062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-41062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41062"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072906-CVE-2024-41062-cb85@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2300709"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42094"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42094"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42094-135f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42133"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024073028-CVE-2024-42133-07c4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42253"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303634"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42253"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42253"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024080835-CVE-2024-42253-0c21@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42265"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42265"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42265-a943@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305423"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42278"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42278"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081742-CVE-2024-42278-e639@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42291"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42291"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42291-6f31@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305439"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42294"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42294-0145@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42302"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42302"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42302-c0d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42304"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42304"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42304"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42304-d0e4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42305"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305450"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42305"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081750-CVE-2024-42305-94ed@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42312"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42312"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081752-CVE-2024-42312-bddc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42315"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305460"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42315"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42315"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42315-a707@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42316"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42316"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081753-CVE-2024-42316-8b49@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305466"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42321"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42321-4b46@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43820"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305478"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43820"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43820"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43820-1bd6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43821"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305479"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43821"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43821"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081724-CVE-2024-43821-6ffc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43823"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305481"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43823"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43823"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081725-CVE-2024-43823-4bdd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43828"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43828"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43828"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081726-CVE-2024-43828-6bcb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43834"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43834"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43834"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081728-CVE-2024-43834-0140@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43846"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305504"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43846"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43846"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081732-CVE-2024-43846-2bd0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43853"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305511"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43853"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43853-da5b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43871"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306365"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43871"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43871"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43871-c2cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43873"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306367"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43873"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43873"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43873-c547@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43882"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306376"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43882"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082152-CVE-2024-43882-4fa4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43884"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43884"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43884"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082621-CVE-2024-43884-43fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43889"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43889"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082600-CVE-2024-43889-4d0b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43898"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082613-CVE-2024-43898-52c2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43910"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43910"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43910"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082630-CVE-2024-43910-c6ec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-43914"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-43914"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43914"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082635-CVE-2024-43914-a664@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44931"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082636-CVE-2024-44931-8212@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44932"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082638-CVE-2024-44932-2659@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082641-CVE-2024-44934-a7fe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44952"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090411-CVE-2024-44952-6290@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44958"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44958"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44958"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090413-CVE-2024-44958-80e9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44964"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090414-CVE-2024-44964-ebb1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44975"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090442-CVE-2024-44975-7c21@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44987"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44987"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44987"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090446-CVE-2024-44987-f916@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-44989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-44989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44989"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090446-CVE-2024-44989-8a2d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-45000"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-45000"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45000"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024090449-CVE-2024-45000-fd6f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-45009"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-45009"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45009"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091104-CVE-2024-45009-24ea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-45010"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-45010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45010"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091107-CVE-2024-45010-33ee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-45016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-45016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45016"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45016-fd5a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-45022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-45022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45022"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091109-CVE-2024-45022-08f3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46673"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46673"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091333-CVE-2024-46673-c49c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46675"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46711"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46711"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46711"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091348-CVE-2024-46711-ab95@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46722"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46722"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46722"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091834-CVE-2024-46722-34b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46723"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46723"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46723"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091834-CVE-2024-46723-6726@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46724"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46724"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46724"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091835-CVE-2024-46724-02f5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46725"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46725"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46725"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091835-CVE-2024-46725-af49@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46743"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091835-CVE-2024-46743-f386@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46745"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46745"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091836-CVE-2024-46745-7b05@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46747"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46747"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46747"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091837-CVE-2024-46747-f489@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46750"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091838-CVE-2024-46750-3be1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46754"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46754"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46754"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091840-CVE-2024-46754-7f04@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46756"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091840-CVE-2024-46756-2ca6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46758"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46758"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46758"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091841-CVE-2024-46758-6154@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46759"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46759"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091841-CVE-2024-46759-9b86@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46761"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46761"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46761"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091842-CVE-2024-46761-289f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46783"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091850-CVE-2024-46783-edcb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46786"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46786"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091851-CVE-2024-46786-a167@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46787"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46787"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46787"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091852-CVE-2024-46787-8b6d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46800"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46800"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46800"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46800-0f62@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46805"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46805"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092709-CVE-2024-46805-b06a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46806"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46806"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092709-CVE-2024-46806-2cc7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46807"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46807"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46807"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092709-CVE-2024-46807-b78e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46819"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46819"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46819"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092712-CVE-2024-46819-d958@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46820"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46820"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46820"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092712-CVE-2024-46820-6405@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46822"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46822"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46822"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092749-CVE-2024-46822-b901@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46828"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46828"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46828"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092751-CVE-2024-46828-2184@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46835"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46835"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46835"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092753-CVE-2024-46835-4f99@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46839"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46839"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46839"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092754-CVE-2024-46839-cfab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46853"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46853"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092742-CVE-2024-46853-ab04@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46864"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46864"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46864"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024092745-CVE-2024-46864-0343@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46871"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46871"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46871"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024100958-CVE-2024-46871-15f4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47141"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011119-CVE-2024-47141-13f5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47660"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47660"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47660"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024100959-CVE-2024-47660-2d61@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47668"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024100906-CVE-2024-47668-6b53@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47678"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47678"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47678"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47678-0b1b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47685"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47685"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47685"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47685-af1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47687"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47687"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47687"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47687-9a03@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47692"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47692"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47692"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47692-38d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47700"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47700"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47700"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47700-00ff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47703"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47703"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47703"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47703-36ea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47705"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47705"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47705"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47705-12bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47706"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47706"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47706"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47706-7312@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47710"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47710"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47710-3882@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47713"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47713"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47713"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47713-2624@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47715"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47715"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47715"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47715-ff4e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47718"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47718"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47718"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47718-c7cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47719"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47719"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47719"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47719-09a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47737"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47737"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47737"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47737-b77e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47738"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47738"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47738-3f0e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47739"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47739-8bc4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47745"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47745"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47745-42e6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-47748"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-47748"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47748"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47748-a134@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-48873"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-48873"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-48873"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-48873-75a9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49569"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49569"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49569"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011122-CVE-2024-49569-c532@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49851"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49851"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49851"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49851-edd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49856"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49856"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49856"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49856-f5f7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49860"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49860"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49860-2a48@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49861"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320275"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49861"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49861"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49861-5288@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49862"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49862"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49862-b995@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49870"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49870"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49870"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49870-44f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49875"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49875"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49875"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49875-02ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49878"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49878"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49878-8099@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49881"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49881-bfd0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49882"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49882"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49882-4169@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49883"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49883-ca93@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49884"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49884"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49884"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49884-fa56@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49885"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49885"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49885-d5d0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49886"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49886"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49886"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49886-3477@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49889"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49889"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49889-6140@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49904"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-49904-121b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49927"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49927"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49927-86cf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49928"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49928"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49928-05d6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49929"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49929-1031@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49930"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49930"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49930-34e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49933"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-49933-f918@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-49934-0ac9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49935"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49935"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-49935-004d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49937"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49937"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49937"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102127-CVE-2024-49937-74ee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49938"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102127-CVE-2024-49938-5a61@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49939"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49939"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49939"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102127-CVE-2024-49939-b39d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49946"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49946"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-49946-762f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49948"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49948"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49948"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-49948-ba28@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49950"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-49950-bbf4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49951"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49951-a620@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49954"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49954"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49954"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49954-cea5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49959"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49959"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49959"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49959-ce09@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49960"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49960"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49960"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49960-f9cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49962"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49962"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49962"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49962-8d16@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49967"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49967"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49967"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49967-a58a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49968"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49968"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49968"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49968-ce10@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49971"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49971"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49971"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49971-ad07@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49973"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49973"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49973-8824@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49974"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49974-bda6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49975"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49975-4533@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49977"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49977-b657@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49983"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49983-275e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49991"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49991"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49991"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49991-59d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49993"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49993"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49993-5b57@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49994"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49994"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49994"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49994-de99@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49995"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49995"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49995"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49995-ec59@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-49999"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-49999"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49999"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49999-e815@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50002"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50002-bdfd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50006"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50006"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50006-fe44@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50008"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50008"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50008"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50008-0152@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50009"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50009"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50009"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50009-1b62@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50013"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50013"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50013-05ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50014"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50014"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50014-d684@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50015"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50015"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50015-1eb0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50018"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50018"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50018"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-50018-65e9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50019"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50019"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50019"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-50019-5896@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50022"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50022-0531@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50023"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50023"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50024"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50024"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50024"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50024-a052@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50027"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50027"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50027"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50027-91e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50028"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50028-5655@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50029"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50029"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50029"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50029-8df2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50033"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50033"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50033-ce5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50035"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50035"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50035"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50035-82d8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50038"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50038"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50038"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50038-dc41@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50039"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50039"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50039"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50039-41b0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50044"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50044"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50044"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50044-2ee1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50046"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50046"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50046"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50046-a9b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50047"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50047"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50047"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50047-7a27@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50055"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50055-7d1f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50057"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50057"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50057"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50058"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50058"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50058"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50058-e827@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50064"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50064"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50064-33d1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50067"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50067"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50067"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102859-CVE-2024-50067-f7c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50073"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102935-CVE-2024-50073-307b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50074"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102935-CVE-2024-50074-d44d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50075"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102935-CVE-2024-50075-81b7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50077"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50077"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50077"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102936-CVE-2024-50077-2940@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50078"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50078"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102936-CVE-2024-50078-cfe9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50081"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50081"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50081"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102937-CVE-2024-50081-f8d6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50082"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50082"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50082"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102937-CVE-2024-50082-c5b1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50093"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50093"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110551-CVE-2024-50093-2811@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50101"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50101"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50101"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110526-CVE-2024-50101-d1bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50102"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50102"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50102"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110553-CVE-2024-50102-3d1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50106"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50106"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50106"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110553-CVE-2024-50106-c095@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50107"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50107"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110554-CVE-2024-50107-6bdf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50109"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50109"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110554-CVE-2024-50109-b93c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50117"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50117"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50117"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110555-CVE-2024-50117-83b1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50120"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110556-CVE-2024-50120-07e2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50121"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110556-CVE-2024-50121-2a0a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50126"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50126"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50126"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110557-CVE-2024-50126-733b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50127"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50127"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50127"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110557-CVE-2024-50127-c0b5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50128"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50128"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110557-CVE-2024-50128-0fd8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50130"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50130"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110558-CVE-2024-50130-7580@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50141"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110742-CVE-2024-50141-a773@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50143"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50143"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110743-CVE-2024-50143-4678@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50150"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110745-CVE-2024-50150-0254@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50151"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110745-CVE-2024-50151-f52b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50152"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50152"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50152"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110745-CVE-2024-50152-535e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50153"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50153"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110745-CVE-2024-50153-ecf2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50162"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50162"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50162"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110747-CVE-2024-50162-474e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50163"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50163"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50163"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110747-CVE-2024-50163-6769@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50169"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50169"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50169"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110749-CVE-2024-50169-9df5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50182"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110833-CVE-2024-50182-0fe4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50186"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50186"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50186"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110834-CVE-2024-50186-acb0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50189"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110851-CVE-2024-50189-48c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50191"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50191"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50191"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110851-CVE-2024-50191-f31c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50197"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50197"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50197"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/security/vulns.git/tree/cve/published/2024/CVE-2024-50197.mbox"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50199"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50199"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50199"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/security/vulns.git/tree/cve/published/2024/CVE-2024-50199.mbox"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50200"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50200"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/security/vulns.git/tree/cve/published/2024/CVE-2024-50200.mbox"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50201"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50201"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50201"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110818-CVE-2024-50201-b73d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50215"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50215"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50215"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110924-CVE-2024-50215-0155@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50216"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50216"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50216"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110924-CVE-2024-50216-a031@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50219"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50219"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50219"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110925-CVE-2024-50219-c970@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50228"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50228"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50228"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110928-CVE-2024-50228-7a2a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50235"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110931-CVE-2024-50235-14eb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50236"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50236"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110931-CVE-2024-50236-49dc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50237"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50237"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110932-CVE-2024-50237-7073@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50256"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50256"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50256"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110938-CVE-2024-50256-5b66@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50261"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50261"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50261"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024110940-CVE-2024-50261-3a20@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50271"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111929-CVE-2024-50271-9089@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50272"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50272"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111930-CVE-2024-50272-5691@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50278"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50278"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50278"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111937-CVE-2024-50278-d6c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50282"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50282"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111943-CVE-2024-50282-1579@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50299"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-50299-795d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-50304"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-50304"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50304"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-50304-da6d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53042"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53042"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53042-f7e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53044"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53044"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53044"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53044-e0d1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53047"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53047"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53047"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53047-8214@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53050"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53050"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53050"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53050-b59c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53051"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53051"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53051-5184@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53055"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53055-4a64@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53057"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53057"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53057"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53057-a3a5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53059"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53059"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53059"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53059-4f81@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53060"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53060-3b94@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53070"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53070-6eea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53072"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53072"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-53072-f307@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53074"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53074-e49b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53082"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53082"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53082"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53082-30c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53085"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53085"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53085-9cf3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53091"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53091"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53091"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024112151-CVE-2024-53091-7f61@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53093"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53093"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024112152-CVE-2024-53093-f854@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53095"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53095"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024112152-CVE-2024-53095-7ffd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53096"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53096-5bcc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53097"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53097"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024112505-CVE-2024-53097-cd93@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53103"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53103"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53103"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120230-CVE-2024-53103-b5ea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53105"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53105"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53105"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120244-CVE-2024-53105-d978@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53110"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53110"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120248-CVE-2024-53110-3bff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53117"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53117"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53117"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120250-CVE-2024-53117-145b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53118"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53118"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120251-CVE-2024-53118-c6d7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53120"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120251-CVE-2024-53120-65fd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53121"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53121-34da@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53123"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53123"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53123-cd09@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53124"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53124"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53124"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120253-CVE-2024-53124-91b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53134"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53134"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53134"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120451-CVE-2024-53134-cb0a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53136"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53136"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53136"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120452-CVE-2024-53136-f7f8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330763"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53141"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120606-CVE-2024-53141-195b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53142"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53142"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53142"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024120609-CVE-2024-53142-b75e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53146"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53146"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53146"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122426-CVE-2024-53146-c503@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53152"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53152"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53152"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122428-CVE-2024-53152-ada9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53156"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53156"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122429-CVE-2024-53156-732e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53160"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53160"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53160"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122431-CVE-2024-53160-692f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53161"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53161"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53161"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122431-CVE-2024-53161-50f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53164"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53164"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53164"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122746-CVE-2024-53164-752a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53166"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122714-CVE-2024-53166-8beb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53173"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53173"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53173"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-53173-b3c7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53174"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53174"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53174"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122717-CVE-2024-53174-d29a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53176"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334355"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53176"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122718-CVE-2024-53176-85e0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53190"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122723-CVE-2024-53190-fdeb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53194"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122724-CVE-2024-53194-9edf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53203"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122727-CVE-2024-53203-80fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53208"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53208"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122729-CVE-2024-53208-dff3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53213"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53213"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122730-CVE-2024-53213-baa6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334415"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53216"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53216"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122732-CVE-2024-53216-ba8b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53222"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53222"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53222-6c79@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53224"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53224"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53224"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-53224-2509@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53232"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53232"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-53232-6919@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53237"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53237"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122739-CVE-2024-53237-2fa6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-53681"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-53681"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53681"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011532-CVE-2024-53681-e199@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-54460"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-54460"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-54460"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011158-CVE-2024-54460-c8c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-54680"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-54680"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-54680"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011145-CVE-2024-54680-db98@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56535"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56535"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-56535-4683@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334428"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56544"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122728-CVE-2024-56544-42cf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56551"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56551"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56551"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122709-CVE-2024-56551-4ad2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56558"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56558"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56558"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122712-CVE-2024-56558-9fd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56562"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56562"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56562"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122713-CVE-2024-56562-9fd5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56566"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56566"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122715-CVE-2024-56566-0a7e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56570"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56570"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56570"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122716-CVE-2024-56570-7580@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56590"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56590"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56590-d4ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56591"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56591"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56591"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122759-CVE-2024-56591-eaf9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56600"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56600"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122702-CVE-2024-56600-7867@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56601"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56601"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56601"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56601-2150@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56602"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56602"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56602"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122703-CVE-2024-56602-d030@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56604"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56604"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56604"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56604-8494@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56605"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56605"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56605"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122704-CVE-2024-56605-d424@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56611"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56611"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56611"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122706-CVE-2024-56611-262a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56614"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56614"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56614"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122707-CVE-2024-56614-17c4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56616"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56616"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56616"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122708-CVE-2024-56616-ae89@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56623"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122710-CVE-2024-56623-e4c7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56631"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56631"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122731-CVE-2024-56631-548f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56642"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56642"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56642-71ee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56644"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56644"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56644"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56644-83c2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56647"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122738-CVE-2024-56647-d71f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56653"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56653"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56653"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56653-bb35@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56654"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56654"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56654"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122749-CVE-2024-56654-66a1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56663"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56663-66d7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56664"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56664"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122752-CVE-2024-56664-9dc6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56667"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56667"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122753-CVE-2024-56667-3c3f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56688"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56688"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56688"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122834-CVE-2024-56688-4e02@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56693"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56693"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122835-CVE-2024-56693-b3c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56729"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56729"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56729"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122924-CVE-2024-56729-8f1c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56757"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56757"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56757"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025010651-CVE-2024-56757-c26b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56760"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56760"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025010654-CVE-2024-56760-af6e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56779"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025010812-CVE-2024-56779-74f5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56783"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025010807-CVE-2024-56783-4ed9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57798"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57798"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57798"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011151-CVE-2024-57798-68b5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57809"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57809"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57809"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57809-a6be@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57843"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57843"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57843"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011103-CVE-2024-57843-1c15@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57852"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57852"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-57852-f942@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57879"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011131-CVE-2024-57879-7fa8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57884"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57884"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57884"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011510-CVE-2024-57884-4cf8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57885"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57885"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011510-CVE-2024-57885-ea46@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57888"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57888"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57888"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011511-CVE-2024-57888-0b38@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57890"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57890"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57890"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/b92667f755749cf10d9ef1088865c555ae83ffb7"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/c2f961c46ea0e5274c5c320d007c2dd949cf627a"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/d0257e089d1bbd35c69b6c97ff73e3690ab149a9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57894"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57894"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57894"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011513-CVE-2024-57894-fbfe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57898"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011515-CVE-2024-57898-bfde@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57903"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57903"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011517-CVE-2024-57903-fd2a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57929"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011945-CVE-2024-57929-2b82@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57931"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025012147-CVE-2024-57931-06fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57940"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57940"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57940"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025012128-CVE-2024-57940-e289@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-58009"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348526"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-58009"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58009"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58009-b2d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-58064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350354"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-58064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58064"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025030609-CVE-2024-58064-6aa6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-58099"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-58099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58099"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025042936-CVE-2024-58099-39c4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1272"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-1272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-1272"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21646"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011945-CVE-2025-21646-8f6e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21663"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025012135-CVE-2025-21663-7420@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21666"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21666"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025013157-CVE-2025-21666-465a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21668"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025013158-CVE-2025-21668-f82f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21669"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025013158-CVE-2025-21669-b52c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21689"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21689"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21689"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025021055-CVE-2025-21689-7ffe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21694"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21694"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/649b266606bc413407ce315f710c8ce8a88ee30a"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/65c367bd9d4f43513c7f837df5753bea9561b836"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/80828540dad0757b6337c6561d49c81038f38d87"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/80da29deb88a3a907441fc35bb7bac309f31e713"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/84c4ed15626574c9ac6c1039ba9c137a77bcc7f2"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/a5a2ee8144c3897d37403a69118c3e3dc5713958"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/cbc5dde0a461240046e8a41c43d7c3b76d5db952"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21888"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21888"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21888"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21888-0f83@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-22087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-22087"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22087"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025041616-CVE-2025-22087-d711@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-68179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2422662"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-68179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68179"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025121631-CVE-2025-68179-6ce9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-71151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2432362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-71151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71151"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2026012328-CVE-2025-71151-1a45@gregkh/T"}],"affected":[{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt-addons","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-uki-virt-addons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt-addons","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-uki-virt-addons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt-addons","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-uki-virt-addons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt-addons","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-uki-virt-addons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-uki-virt-addons","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-uki-virt-addons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-570.12.1.el9_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:6966.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}