{"id":"RHSA-2026:18134","summary":"Red Hat Security Advisory: kernel security update","modified":"2026-05-22T10:06:10Z","published":"2026-05-19T10:06:33Z","upstream":["CVE-2024-56633","CVE-2025-21839","CVE-2025-37980","CVE-2025-38015","CVE-2025-38097","CVE-2025-38166","CVE-2025-38202","CVE-2025-38267","CVE-2025-38275","CVE-2025-38279","CVE-2025-38345","CVE-2025-38346","CVE-2025-38405","CVE-2025-38441","CVE-2025-38470","CVE-2025-39866","CVE-2025-40034","CVE-2025-40134","CVE-2025-40210","CVE-2025-40257","CVE-2025-40320","CVE-2026-23040","CVE-2026-23111","CVE-2026-23210","CVE-2026-23243"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:18134"},{"type":"ARTICLE","url":"https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.2_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2334549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350585"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376065"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379237"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383478"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383906"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396940"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2406782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414468"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416307"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418880"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2436806"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439895"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448594"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-101339"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-101343"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-105431"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-106452"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-107274"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-107916"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-108683"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-114532"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-114533"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-116076"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-116876"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-116879"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-118599"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-120364"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-126233"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-134732"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-135143"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-145936"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-42486"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_18134.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-56633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-56633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56633"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024122734-CVE-2024-56633-ac1d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21839"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21839"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21839"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025030707-CVE-2025-21839-dfd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-37980"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-37980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37980"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025052040-CVE-2025-37980-561f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38015"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38015"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2025-38015-84e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38097"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38097"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025070305-CVE-2025-38097-287c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38166"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025070341-CVE-2025-38166-3dc8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38202"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38202"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38202"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025070418-CVE-2025-38202-bef0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38267"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38267"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38267"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025071007-CVE-2025-38267-2f0c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38275"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38275"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38275"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38275-4db0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38279"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38279"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38279"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38279-af9f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38345"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38345"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38345"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38345-ef5c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38346"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38346"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38346"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38346-8cb6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38405"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38405"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38405"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38405-014e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38441"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38441"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38441"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38441-bb71@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38470"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38470"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38470"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025072811-CVE-2025-38470-a4d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-39866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-39866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39866"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091907-CVE-2025-39866-45d3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40034"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40034"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40034"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102811-CVE-2025-40034-e836@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40134"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40134"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40134"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40134-4d24@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40210"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40210"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40210"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025112140-CVE-2025-40210-2490@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40257"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40257"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40257"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120433-CVE-2025-40257-53e6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-40320"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-40320"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40320"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40320-8b44@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-23040"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-23040"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23040"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2026020438-CVE-2026-23040-1980@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-23111"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-23111"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23111"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2026021300-CVE-2026-23111-9762@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-23210"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-23210"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23210"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23210-7cac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-23243"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-23243"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23243"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2026031816-CVE-2026-23243-b88e@gregkh/T"}],"affected":[{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-modules-extra-matched","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-modules-extra-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-uki-virt-addons","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-uki-virt-addons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:10.2","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.12.0-211.7.1.el10_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:18134.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}]}