{"id":"RHSA-2022:1988","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-04-09T10:01:54Z","published":"2024-09-16T06:30:36Z","upstream":["CVE-2020-0404","CVE-2020-13974","CVE-2020-27820","CVE-2020-4788","CVE-2021-0941","CVE-2021-20322","CVE-2021-21781","CVE-2021-26401","CVE-2021-29154","CVE-2021-3612","CVE-2021-3669","CVE-2021-37159","CVE-2021-3743","CVE-2021-3744","CVE-2021-3752","CVE-2021-3759","CVE-2021-3764","CVE-2021-3772","CVE-2021-3773","CVE-2021-3923","CVE-2021-4002","CVE-2021-4037","CVE-2021-40490","CVE-2021-4083","CVE-2021-4093","CVE-2021-4157","CVE-2021-41864","CVE-2021-4197","CVE-2021-4203","CVE-2021-42739","CVE-2021-43056","CVE-2021-43389","CVE-2021-43976","CVE-2021-4460","CVE-2021-44733","CVE-2021-45485","CVE-2021-45486","CVE-2021-47076","CVE-2021-47178","CVE-2021-47203","CVE-2021-47301","CVE-2021-47435","CVE-2021-47498","CVE-2021-47501","CVE-2021-47544","CVE-2021-47556","CVE-2021-47590","CVE-2021-47614","CVE-2022-0001","CVE-2022-0002","CVE-2022-0286","CVE-2022-0322","CVE-2022-0850","CVE-2022-1011","CVE-2022-3105","CVE-2022-3106","CVE-2022-3108","CVE-2022-48771","CVE-2022-48904","CVE-2022-49227","CVE-2022-50131","CVE-2022-50475","CVE-2022-50510","CVE-2022-50536","CVE-2023-0459","CVE-2023-53570","CVE-2023-53649"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:1988"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1888433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1919791"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946684"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951739"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1957375"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1974079"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1978123"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981950"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983894"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1985353"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986473"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1994390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1997338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1997467"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1997961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999675"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2000694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2004949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2009521"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2010463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2011104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015525"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017073"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017796"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2018205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022814"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025003"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2029923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2030476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2030747"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2036934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037019"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039911"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039914"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042798"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048251"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064855"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1988.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0404"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0404"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0404"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-4788"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-4788"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-4788"},{"type":"ARTICLE","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/189296"},{"type":"ARTICLE","url":"https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2020/11/20/3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-13974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-13974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13974"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-27820"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-27820"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27820"},{"type":"ARTICLE","url":"https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-0941"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-0941"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0941"},{"type":"ARTICLE","url":"https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3612"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3612"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3612"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3743"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"},{"type":"ARTICLE","url":"https://lists.openwall.net/netdev/2021/08/17/124"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3744"},{"type":"ARTICLE","url":"https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3752"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3752"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3752"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/09/15/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3759"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3759"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3764"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3764"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3764"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3773"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3773"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3923"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3923"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4002"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/11/25/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4037"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4037"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4037"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4083"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2028584"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4093"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4157"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4157"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4157"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4197"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4197"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4197"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4203"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4460"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4460"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4460"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2021-4460-aa71@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20322"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21781"},{"type":"ARTICLE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-26401"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-26401"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26401"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29154"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29154"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-37159"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-37159"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37159"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/linux-usb/msg202228.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-40490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2001951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-40490"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-40490"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41864"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41864"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41864"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-42739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-42739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42739"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43056"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43056"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43056"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43389"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43389"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43389"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43976"},{"type":"ARTICLE","url":"https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-44733"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-44733"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44733"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-45485"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-45485"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45485"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-45486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-45486"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45486"},{"type":"ARTICLE","url":"https://arxiv.org/pdf/2112.09604.pdf"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47076"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267525"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47076"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47178"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47178"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032538-CVE-2021-47178-6167@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47203"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274634"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47203"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47301"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282482"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47301"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47301"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052126-CVE-2021-47301-13b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47435"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47435"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282917"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47498"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47498"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47501"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47501"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47501"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283406"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47544"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283393"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47590"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47614"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47614"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0001"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0001"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0001"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"},{"type":"ARTICLE","url":"https://www.vusec.net/projects/bhi-spectre-bhb/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0002"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0286"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0286"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0286"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0322"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0850"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0850"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0850"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"},{"type":"ARTICLE","url":"https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1011"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1011"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3105"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153067"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3105"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3105"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3106"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3106"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3106"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293337"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48771"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48771"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48904"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307157"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48904"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49227"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49227"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49227"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49227-76b1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50131"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50131"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50131-4df3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50475"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401529"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50475"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50475"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50510"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50510"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50510"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50510-c055@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402257"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50536"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2216383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0459"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53570"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401560"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53570"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53570"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53570-3733@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402214"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53649"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53649-0a4a@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1988.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}