{"id":"RHSA-2022:7683","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-04-28T10:02:47Z","published":"2024-09-16T07:42:09Z","upstream":["CVE-2020-36516","CVE-2020-36558","CVE-2021-30002","CVE-2021-3640","CVE-2021-47099","CVE-2021-47103","CVE-2021-47107","CVE-2021-47213","CVE-2021-47378","CVE-2021-47580","CVE-2021-47639","CVE-2021-47649","CVE-2021-47657","CVE-2022-0168","CVE-2022-0617","CVE-2022-0854","CVE-2022-1016","CVE-2022-1048","CVE-2022-1055","CVE-2022-1158","CVE-2022-1184","CVE-2022-1263","CVE-2022-1280","CVE-2022-1852","CVE-2022-20368","CVE-2022-20572","CVE-2022-2078","CVE-2022-21499","CVE-2022-2153","CVE-2022-23960","CVE-2022-24448","CVE-2022-2503","CVE-2022-2586","CVE-2022-26373","CVE-2022-2639","CVE-2022-27950","CVE-2022-28390","CVE-2022-28893","CVE-2022-2938","CVE-2022-29581","CVE-2022-3107","CVE-2022-36946","CVE-2022-48735","CVE-2022-48738","CVE-2022-48765","CVE-2022-48786","CVE-2022-48912","CVE-2022-48915","CVE-2022-48918","CVE-2022-48943","CVE-2022-49044","CVE-2022-49060","CVE-2022-49063","CVE-2022-49066","CVE-2022-49086","CVE-2022-49098","CVE-2022-49122","CVE-2022-49123","CVE-2022-49129","CVE-2022-49130","CVE-2022-49145","CVE-2022-49156","CVE-2022-49158","CVE-2022-49160","CVE-2022-49175","CVE-2022-49199","CVE-2022-49235","CVE-2022-49238","CVE-2022-49259","CVE-2022-49263","CVE-2022-49265","CVE-2022-49268","CVE-2022-49272","CVE-2022-49288","CVE-2022-49290","CVE-2022-49292","CVE-2022-49343","CVE-2022-49347","CVE-2022-49349","CVE-2022-49374","CVE-2022-49378","CVE-2022-49398","CVE-2022-49404","CVE-2022-49409","CVE-2022-49418","CVE-2022-49426","CVE-2022-49433","CVE-2022-49515","CVE-2022-49534","CVE-2022-49536","CVE-2022-49537","CVE-2022-49538","CVE-2022-49541","CVE-2022-49543","CVE-2022-49559","CVE-2022-49561","CVE-2022-49584","CVE-2022-49605","CVE-2022-49606","CVE-2022-49610","CVE-2022-49611","CVE-2022-49615","CVE-2022-49616","CVE-2022-49625","CVE-2022-49626","CVE-2022-49664","CVE-2022-49669","CVE-2022-49671","CVE-2022-49673","CVE-2022-49674","CVE-2022-49695","CVE-2022-49697","CVE-2022-49698","CVE-2022-49707","CVE-2022-49708","CVE-2022-49710","CVE-2022-50027","CVE-2022-50030","CVE-2022-50053","CVE-2022-50054","CVE-2022-50055","CVE-2022-50069","CVE-2022-50081","CVE-2022-50084","CVE-2022-50085","CVE-2022-50092","CVE-2022-50110","CVE-2022-50115","CVE-2022-50177","CVE-2022-50178","CVE-2022-50187","CVE-2022-50213","CVE-2023-4387","CVE-2023-53181"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:7683"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/6971358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977993"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1978539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2004037"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2019942"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2051444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2058369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2058395"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2059928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2070205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2070220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072552"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2080095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084183"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2088021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089815"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090940"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2091539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2096178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2100259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2109327"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2112693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115065"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123695"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7683.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36516"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36516"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36516"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/netdev/msg795642.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36558"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36558"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36558"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"},{"type":"ARTICLE","url":"https://lkml.org/lkml/2021/8/28/238"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/07/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-30002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-30002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-30002"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47099"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267919"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47099"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47103"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267914"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47103"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47103"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030416-CVE-2021-47103-4314@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267911"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47107"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030445-CVE-2021-47107-7dda@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274573"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47213"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041005-CVE-2021-47213-c84f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47378"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47378"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052142-CVE-2021-47378-8e72@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348067"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47639"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2021-47639-9183@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348193"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47649"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022649-CVE-2021-47649-f358@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348201"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47657"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47657"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022650-CVE-2021-47657-6f3d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0168"},{"type":"ARTICLE","url":"https://starlabs.sg/advisories/22/22-0168/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0617"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0617"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0854"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0854"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0854"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1016"},{"type":"ARTICLE","url":"http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q1/205"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1048"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1048"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1055"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5"},{"type":"ARTICLE","url":"https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069793"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1158"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/04/08/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1184"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1263"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/04/07/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1280"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2071022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1280"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1852"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2078"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2078"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069736"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2153"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/06/22/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2503"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2503"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2503"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2586"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/08/09/5"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2639"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2639"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2938"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3107"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20368"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20368"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20572"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20572"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21499"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21499"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21499"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23960"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23960"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23960"},{"type":"ARTICLE","url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24448"},{"type":"ARTICLE","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-26373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-26373"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-26373"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27950"},{"type":"ARTICLE","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=817b8b9c5396d2b2d92311b46719aad5d3339dbe"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/03/13/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28390"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28893"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28893"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28893"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/3"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/04/11/4"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29581"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8"},{"type":"ARTICLE","url":"https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36946"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36946"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293324"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48735"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062001-CVE-2022-48735-32e6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48738"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293321"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48738"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062001-CVE-2022-48738-ecf0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48765"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293344"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48765"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48765"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024062009-CVE-2022-48765-ddb8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48786"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024071637-CVE-2022-48786-7416@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48912"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307165"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48912"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48912"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082215-CVE-2022-48912-3f55@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48915"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48915"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48915"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082216-CVE-2022-48915-6663@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307171"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48918"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48918"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307199"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48943"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48943"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082227-CVE-2022-48943-8e11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49044"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49044"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49044"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022650-CVE-2022-49044-43d1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348065"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49060"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49060-6210@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49063"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348323"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49063"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49063"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49063-a6de@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49066"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348115"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49066"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022654-CVE-2022-49066-bc68@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49086"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49086"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49098"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348148"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49098"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49098"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2022-49098-9755@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49122"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49122"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49122"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2022-49122-b139@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49123"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348213"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49123"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2022-49123-8a84@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49129"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347839"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49129"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2022-49129-a098@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49130"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348275"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49130"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2022-49130-8e95@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348029"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49145"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49145-3c50@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49156"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49156-a5c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49158"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49158"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49158"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49158-64aa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347673"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49160"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49160"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49160-0990@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348314"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49175"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49175"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49175-1b88@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49199"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49199"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49199-54e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49235"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49235-52fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348142"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49238"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49238"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49238-3642@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348360"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49259"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49259"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49259-00f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348286"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49263"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49263-2e87@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49265"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348093"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49265"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49265-11d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348329"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49268"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49268"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49268-4842@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348064"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49272"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49272-4b85@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49288"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347877"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49288"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49288-d3cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347727"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49290"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49290-42e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49292"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49292-b60c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348095"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49343"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49343"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2022-49343-bddc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347821"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49347"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49347"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2022-49347-6ba6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49349"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49349"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49349"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2022-49349-a7f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347724"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49374"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49374"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49374-22a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49378"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49378"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2022-49378-2598@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49398"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49398"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022650-CVE-2022-49398-9274@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49404"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348266"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49404"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49404"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022651-CVE-2022-49404-9bb3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49409"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348330"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49409"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49409-b4e3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348347"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49418"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49418"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49418-ff01@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347804"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49426"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49426"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49426-313d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348214"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49433"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49433"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2022-49433-5ef1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49515"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49515"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49515-61ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49534"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49534"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49534"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49534-ad11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347847"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49536"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49536-db89@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49537"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49537"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49537-abf2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49538"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49538"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49538-c7b9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348119"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49541"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49541-7460@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348015"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49543"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49543-09f7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348281"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49559"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49559"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49559-7711@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348159"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49561"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49561"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49561-3e6a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49584"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347764"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49584"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49584"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49584-ceae@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49605"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348215"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49605"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49605"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49605-fef2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348277"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49606"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49606-3753@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49610"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347926"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49610"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49610-5628@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49611"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348077"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49611"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49611"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347956"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49615"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49615-e815@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347865"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49616"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49616"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49616-5eb4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49625"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49625-2fa2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348032"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49626"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49626"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49626-e785@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49664"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49664-d3af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49669"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348086"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49669"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022623-CVE-2022-49669-44d5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348040"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49671-62fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49673"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347792"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49673"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49673-0197@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49674"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347967"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49674"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49674"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49674-90d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347672"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49695"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49695"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49695-59b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49697"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49697"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49697"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49697-db0b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49698"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49698"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49698-9ddd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348100"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49707"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49707-c4b7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49708"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347684"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49708"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49708"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49708-f056@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49710"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49710-0591@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50027"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373520"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50027"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50027"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061837-CVE-2022-50027-fb5c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50030"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50030"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50030"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2022-50030-83c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373553"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50053"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50054"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50054"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50054"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50054-a29e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50055"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373670"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50055"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50055-67ab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373533"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50069"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50069"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061852-CVE-2022-50069-9dba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50081"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373518"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50081"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50081"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061857-CVE-2022-50081-80dc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50084"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061858-CVE-2022-50084-6b7c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50085"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373463"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50085"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061858-CVE-2022-50085-7e05@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50092"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373527"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50092"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061801-CVE-2022-50092-dcb8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50110"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50110"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-50110-5027@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50115"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373645"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50115"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50115"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061809-CVE-2022-50115-86c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373568"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50177"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061831-CVE-2022-50177-1d63@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50178"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50178"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061831-CVE-2022-50178-52a0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50187"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50187"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50187-ba19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50213"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2022-50213-bc19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4387"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219270"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4387"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4387"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53181"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395369"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53181"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-425.3.1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:7683.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}