{"id":"RHSA-2023:2458","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-05-12T10:01:58Z","published":"2024-09-16T09:02:33Z","upstream":["CVE-2021-26341","CVE-2021-33631","CVE-2021-33655","CVE-2021-47393","CVE-2021-47441","CVE-2021-47560","CVE-2021-47592","CVE-2021-47671","CVE-2022-1462","CVE-2022-1789","CVE-2022-1882","CVE-2022-20141","CVE-2022-21505","CVE-2022-2196","CVE-2022-2663","CVE-2022-28388","CVE-2022-3028","CVE-2022-33743","CVE-2022-3435","CVE-2022-3522","CVE-2022-3524","CVE-2022-3566","CVE-2022-3567","CVE-2022-3619","CVE-2022-3623","CVE-2022-3625","CVE-2022-3628","CVE-2022-36280","CVE-2022-3640","CVE-2022-36879","CVE-2022-3707","CVE-2022-39188","CVE-2022-39189","CVE-2022-4128","CVE-2022-4129","CVE-2022-41674","CVE-2022-42703","CVE-2022-42720","CVE-2022-42721","CVE-2022-42722","CVE-2022-42896","CVE-2022-43750","CVE-2022-4662","CVE-2022-47929","CVE-2022-48695","CVE-2022-48696","CVE-2022-48701","CVE-2022-48883","CVE-2022-48884","CVE-2022-48885","CVE-2022-48915","CVE-2022-48934","CVE-2022-48939","CVE-2022-48942","CVE-2022-48974","CVE-2022-48976","CVE-2022-48978","CVE-2022-48992","CVE-2022-49010","CVE-2022-49022","CVE-2022-49049","CVE-2022-49058","CVE-2022-49070","CVE-2022-49072","CVE-2022-49080","CVE-2022-49081","CVE-2022-49087","CVE-2022-49097","CVE-2022-49111","CVE-2022-49114","CVE-2022-49116","CVE-2022-49136","CVE-2022-49204","CVE-2022-49205","CVE-2022-49207","CVE-2022-49214","CVE-2022-49223","CVE-2022-49236","CVE-2022-49275","CVE-2022-49283","CVE-2022-49294","CVE-2022-49319","CVE-2022-49323","CVE-2022-49328","CVE-2022-49333","CVE-2022-49345","CVE-2022-49356","CVE-2022-49362","CVE-2022-49365","CVE-2022-49371","CVE-2022-49372","CVE-2022-49376","CVE-2022-49379","CVE-2022-49401","CVE-2022-49416","CVE-2022-49429","CVE-2022-49434","CVE-2022-49442","CVE-2022-49451","CVE-2022-49471","CVE-2022-49492","CVE-2022-49511","CVE-2022-49513","CVE-2022-49519","CVE-2022-49520","CVE-2022-49539","CVE-2022-49541","CVE-2022-49548","CVE-2022-49552","CVE-2022-49562","CVE-2022-49565","CVE-2022-49572","CVE-2022-49573","CVE-2022-49574","CVE-2022-49575","CVE-2022-49577","CVE-2022-49578","CVE-2022-49579","CVE-2022-49580","CVE-2022-49583","CVE-2022-49585","CVE-2022-49586","CVE-2022-49587","CVE-2022-49588","CVE-2022-49589","CVE-2022-49590","CVE-2022-49592","CVE-2022-49593","CVE-2022-49594","CVE-2022-49595","CVE-2022-49596","CVE-2022-49598","CVE-2022-49599","CVE-2022-49600","CVE-2022-49601","CVE-2022-49602","CVE-2022-49603","CVE-2022-49604","CVE-2022-49612","CVE-2022-49629","CVE-2022-49630","CVE-2022-49631","CVE-2022-49632","CVE-2022-49634","CVE-2022-49636","CVE-2022-49637","CVE-2022-49638","CVE-2022-49639","CVE-2022-49641","CVE-2022-49642","CVE-2022-49644","CVE-2022-49646","CVE-2022-49647","CVE-2022-49651","CVE-2022-49655","CVE-2022-49659","CVE-2022-49666","CVE-2022-49688","CVE-2022-49700","CVE-2022-49723","CVE-2022-49726","CVE-2022-49739","CVE-2022-49753","CVE-2022-49848","CVE-2022-49853","CVE-2022-49862","CVE-2022-49872","CVE-2022-49902","CVE-2022-49903","CVE-2022-49908","CVE-2022-49911","CVE-2022-49920","CVE-2022-49925","CVE-2022-49934","CVE-2022-49935","CVE-2022-49936","CVE-2022-49942","CVE-2022-49943","CVE-2022-49944","CVE-2022-49951","CVE-2022-49958","CVE-2022-49959","CVE-2022-49960","CVE-2022-49961","CVE-2022-49962","CVE-2022-49964","CVE-2022-49965","CVE-2022-49966","CVE-2022-49967","CVE-2022-49969","CVE-2022-49970","CVE-2022-49971","CVE-2022-49973","CVE-2022-49974","CVE-2022-49979","CVE-2022-49980","CVE-2022-49981","CVE-2022-49982","CVE-2022-49983","CVE-2022-49984","CVE-2022-49985","CVE-2022-49986","CVE-2022-49990","CVE-2022-49991","CVE-2022-49992","CVE-2022-49993","CVE-2022-49994","CVE-2022-49995","CVE-2022-49998","CVE-2022-50002","CVE-2022-50003","CVE-2022-50006","CVE-2022-50007","CVE-2022-50014","CVE-2022-50015","CVE-2022-50016","CVE-2022-50020","CVE-2022-50021","CVE-2022-50022","CVE-2022-50028","CVE-2022-50029","CVE-2022-50032","CVE-2022-50033","CVE-2022-50034","CVE-2022-50035","CVE-2022-50037","CVE-2022-50039","CVE-2022-50041","CVE-2022-50044","CVE-2022-50046","CVE-2022-50049","CVE-2022-50050","CVE-2022-50051","CVE-2022-50052","CVE-2022-50053","CVE-2022-50054","CVE-2022-50055","CVE-2022-50058","CVE-2022-50068","CVE-2022-50069","CVE-2022-50070","CVE-2022-50079","CVE-2022-50081","CVE-2022-50083","CVE-2022-50086","CVE-2022-50088","CVE-2022-50093","CVE-2022-50100","CVE-2022-50111","CVE-2022-50113","CVE-2022-50120","CVE-2022-50122","CVE-2022-50123","CVE-2022-50124","CVE-2022-50125","CVE-2022-50126","CVE-2022-50129","CVE-2022-50131","CVE-2022-50132","CVE-2022-50133","CVE-2022-50136","CVE-2022-50137","CVE-2022-50138","CVE-2022-50139","CVE-2022-50146","CVE-2022-50147","CVE-2022-50148","CVE-2022-50149","CVE-2022-50151","CVE-2022-50152","CVE-2022-50153","CVE-2022-50154","CVE-2022-50156","CVE-2022-50157","CVE-2022-50164","CVE-2022-50166","CVE-2022-50168","CVE-2022-50172","CVE-2022-50181","CVE-2022-50185","CVE-2022-50189","CVE-2022-50190","CVE-2022-50194","CVE-2022-50196","CVE-2022-50206","CVE-2022-50211","CVE-2022-50215","CVE-2022-50219","CVE-2022-50221","CVE-2022-50224","CVE-2022-50226","CVE-2022-50227","CVE-2022-50228","CVE-2022-50229","CVE-2022-50235","CVE-2022-50241","CVE-2022-50243","CVE-2022-50263","CVE-2022-50271","CVE-2022-50285","CVE-2022-50299","CVE-2022-50302","CVE-2022-50306","CVE-2022-50308","CVE-2022-50318","CVE-2022-50325","CVE-2022-50326","CVE-2022-50344","CVE-2022-50348","CVE-2022-50350","CVE-2022-50363","CVE-2022-50381","CVE-2022-50385","CVE-2022-50388","CVE-2022-50392","CVE-2022-50396","CVE-2022-50402","CVE-2022-50403","CVE-2022-50405","CVE-2022-50408","CVE-2022-50410","CVE-2022-50418","CVE-2022-50425","CVE-2022-50427","CVE-2022-50431","CVE-2022-50436","CVE-2022-50439","CVE-2022-50445","CVE-2022-50452","CVE-2022-50459","CVE-2022-50465","CVE-2022-50467","CVE-2022-50484","CVE-2022-50487","CVE-2022-50496","CVE-2022-50506","CVE-2022-50512","CVE-2022-50516","CVE-2022-50530","CVE-2022-50531","CVE-2022-50534","CVE-2022-50546","CVE-2022-50549","CVE-2022-50554","CVE-2022-50555","CVE-2022-50563","CVE-2022-50569","CVE-2022-50580","CVE-2022-50583","CVE-2022-50615","CVE-2022-50622","CVE-2022-50635","CVE-2022-50668","CVE-2022-50678","CVE-2022-50679","CVE-2022-50698","CVE-2022-50702","CVE-2022-50703","CVE-2022-50714","CVE-2022-50715","CVE-2022-50717","CVE-2022-50723","CVE-2022-50726","CVE-2022-50730","CVE-2022-50738","CVE-2022-50744","CVE-2022-50752","CVE-2022-50768","CVE-2022-50773","CVE-2022-50778","CVE-2022-50783","CVE-2022-50816","CVE-2022-50833","CVE-2022-50835","CVE-2022-50839","CVE-2022-50843","CVE-2022-50855","CVE-2022-50861","CVE-2022-50863","CVE-2022-50866","CVE-2022-50889","CVE-2023-0394","CVE-2023-0461","CVE-2023-0590","CVE-2023-1195","CVE-2023-1382","CVE-2023-2177","CVE-2023-22998","CVE-2023-2513","CVE-2023-52340","CVE-2023-52905","CVE-2023-53020","CVE-2023-53021","CVE-2023-53029","CVE-2023-53030","CVE-2023-53033","CVE-2023-53064","CVE-2023-53083","CVE-2023-53273","CVE-2023-53381","CVE-2023-53393","CVE-2023-53552","CVE-2023-53606","CVE-2023-53634","CVE-2023-53765","CVE-2023-53809","CVE-2023-53811","CVE-2025-21867","CVE-2025-38393"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:2458"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1946801"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1997177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2004384"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061703"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104445"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107924"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2114937"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2116442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119809"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122228"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123857"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130487"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2138321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2138605"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2138866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139610"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149448"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149790"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150960"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160023"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165741"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2166658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2168599"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2169017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176192"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179342"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2458.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-26341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-26341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26341"},{"type":"ARTICLE","url":"https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"},{"type":"ARTICLE","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"},{"type":"ARTICLE","url":"https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2261976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33631"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2024/q1/65"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33655"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33655"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47393"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282345"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47393"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47393"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47441"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282851"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47441"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47441"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47560"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283389"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47560"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47560"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47592"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47592"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47592"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2360784"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025041735-CVE-2021-47671-9b1a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1462"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1462"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1462"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q2/155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1789"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1789"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-v8pq-23qj-q7x7"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/05/25/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1882"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1882"},{"type":"ARTICLE","url":"https://git.kernel.org/linus/353f7988dd8413c4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2196"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2196"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2196"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2663"},{"type":"ARTICLE","url":"https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3028"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3435"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3435"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3522"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3522"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3524"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3566"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3566"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3567"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3567"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3619"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"},{"type":"ARTICLE","url":"https://vuldb.com/?id.211918"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3623"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3625"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3625"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3628"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3628"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3628"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q4/60"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3640"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3640"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3707"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3707"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4128"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4128"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4662"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155788"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-4662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4662"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-20141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-20141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20141"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21505"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21505"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21505"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-33743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-33743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33743"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7&id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/07/05/5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36280"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133450"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36280"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39188"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39188"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"},{"type":"ARTICLE","url":"https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-39189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-39189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39189"},{"type":"ARTICLE","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41674"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41674"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41674"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/10/13/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42703"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42703"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42703"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42720"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42720"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42721"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42722"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42722"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42722"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42896"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42896"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42896"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-43750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-43750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-43750"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-47929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-47929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-47929"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278999"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48695"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48695"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278959"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48696"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48696"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48696-b671@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48701"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48701"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306404"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48883"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48883-4df4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48884"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306405"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48884"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48884"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48884-b273@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48885"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306406"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48885"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082108-CVE-2022-48885-c422@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48915"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48915"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48915"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082216-CVE-2022-48915-6663@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48934-6f50@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48939"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48939"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082226-CVE-2022-48939-ff01@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48942"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48942"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48942"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082227-CVE-2022-48942-ca91@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320729"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48974"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48974-d2d0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320792"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48976"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48976-2980@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48978"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320665"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48978"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48978"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48978-8a19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48992"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320793"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48992"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48992"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49010"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49010"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49022"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49022-c605@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49049"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347670"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49049"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49049"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022651-CVE-2022-49049-d847@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348254"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49058"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49058"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49058-5df2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347832"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49070"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49070-6511@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49072"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348209"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49072"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49072-8479@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49080"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347644"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49080"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49080"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2022-49080-5718@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49081"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49081"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49081"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49081-7a0f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348272"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49087"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49087"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2022-49087-1127@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49097"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2022-49097-fb5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49111"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49111"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49111"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49111-8795@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49114"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348136"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49114"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49114"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49114-86bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49116"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347686"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49116"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49116"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2022-49116-8bf8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348179"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49136"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49136"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2022-49136-033c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348220"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49204"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49204"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49204-38c3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348068"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49205"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49205"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49205-5180@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49207"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347653"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49207"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49207"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49207-cfc1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49214"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022620-CVE-2022-49214-1b9a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49223"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49223"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49223"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022621-CVE-2022-49223-5a42@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49236"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348037"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49236"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49236"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022624-CVE-2022-49236-e3f7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347795"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49275"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49275"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49275-9e36@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347823"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49283"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022632-CVE-2022-49283-e19b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348003"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49294"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022625-CVE-2022-49294-a2fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49319"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347683"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49319"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2022-49319-f0b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49323"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347660"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49323"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49323"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49323-7559@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49328"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49328"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2022-49328-ec2f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49333"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347763"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49333"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49333"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2022-49333-8ae3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49345"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347854"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49345"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49345"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2022-49345-5c80@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348053"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49356"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49356"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2022-49356-6195@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49362"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347808"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49362"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49362"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2022-49362-3299@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49365"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347917"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49365"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49365"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2022-49365-37e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49371"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49371"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49371-30f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348024"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49372"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49372"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49372-45e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49376"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49376"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2022-49376-9ec1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49379"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49379"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2022-49379-722a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49401"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347828"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49401"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49401"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022651-CVE-2022-49401-2fa3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49416"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347666"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49416"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49416"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49416-7c8e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347775"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49429"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49429"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2022-49429-c9a7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348072"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49434"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49434"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2022-49434-4a2c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347659"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49442"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49442"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49442-ae21@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347940"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49451"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49451"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2022-49451-5d2f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49471"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49471"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49471"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49471-4e82@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347913"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49492"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49492"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2022-49492-6a2d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347746"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49511"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49511"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49511-100a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49513"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49513-f147@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348111"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49519"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49519"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49519-3b0d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347923"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49520"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49520"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022611-CVE-2022-49520-465c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347661"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49539"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49539"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49539-9ea2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348119"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49541"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49541-7460@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49548"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347871"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49548"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49548"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022615-CVE-2022-49548-47fe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49552"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347947"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49552"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49552"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49552-e30f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49562"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347787"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49562"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49562"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49562-1d2c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49565"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49565"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2022-49565-e60d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348047"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49572"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49572"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2022-49572-51d7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49573"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348175"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49573"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49573"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49573-e482@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49574"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348338"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49574"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49574"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49574-018f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49575"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347915"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49575"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49575"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49575-ccf0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348255"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49577"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49577"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49577-da62@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347713"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2022-49578-6d9b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49579"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49579"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49579"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49579-4f40@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347671"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49580-c398@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49583"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49583"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49583-d8d5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49585"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347801"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49585"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49585"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49585-659c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49586"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348169"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49586-f70a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49587"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49587"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49587"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49587-33ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49588"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49588"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49588"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49588-9a52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49589"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49589"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2022-49589-fb90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347769"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49590"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49590-44d5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49592"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347803"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49592"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49592"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49592-f07c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49593"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348172"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49593"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49593"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49593-b98d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348000"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49594"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49594-5cb2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49595"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49595"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2022-49595-6abc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49596"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49596"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49596"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022611-CVE-2022-49596-ebcf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49598"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347827"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49598"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022611-CVE-2022-49598-d784@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49599"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348356"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49599"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022611-CVE-2022-49599-4a64@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49600"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49600"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022611-CVE-2022-49600-9d38@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49601"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49601"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022611-CVE-2022-49601-75fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49602"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347941"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49602"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49602"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49602-0366@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49603"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348331"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49603"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49603"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49603-e042@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49604"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347711"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49604"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49604"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022612-CVE-2022-49604-eb2c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347726"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49612"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49612"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022613-CVE-2022-49612-8875@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348210"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49629"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49629"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49629-c5d3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49630"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49630"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49630"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022616-CVE-2022-49630-71c3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49631"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49631-b546@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348197"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49632"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49632-ea1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49634"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49634"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022617-CVE-2022-49634-4a89@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347709"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49636"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49636-b283@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49637"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348310"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49637"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49637"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49637-402f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49638"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49638"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49638"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49638-e524@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49639"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49639-a1b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49641"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347954"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49641"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49641"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022618-CVE-2022-49641-00e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348085"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49642"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49642-dbbe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49644"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49644"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49644"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49644-e3b0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348256"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49646"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49646-248b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348050"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49647"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49647-b3cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49651"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347649"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49651"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49651"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022620-CVE-2022-49651-601b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49655"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347645"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49655"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022621-CVE-2022-49655-0370@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49659"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49659"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49659-31c4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348303"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49666"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022623-CVE-2022-49666-98ab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347700"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49688"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49688"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49688-5c71@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49700"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49700"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49700-2b3e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49723"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49723"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49723-ac32@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347948"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49726"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49726"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49726-582f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49739"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355515"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49739"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49739-a93e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49753"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355521"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49753"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49753"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49753-d1ce@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49848"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49848"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49848"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050143-CVE-2022-49848-0e49@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49853"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49853"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050144-CVE-2022-49853-a5ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49862"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49862"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49862"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050147-CVE-2022-49862-04f2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49872"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49872"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49872"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050151-CVE-2022-49872-0c67@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49902"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363385"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49902"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49902"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050102-CVE-2022-49902-59fe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49903"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363491"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49903"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050102-CVE-2022-49903-23a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49908"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363373"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49908"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49908"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050104-CVE-2022-49908-ad9a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49911"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363421"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49911"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49911"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050105-CVE-2022-49911-2e28@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49920"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49920"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49920"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050108-CVE-2022-49920-667b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49925"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363363"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49925"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49925"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050110-CVE-2022-49925-2485@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373399"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-49934-108e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49935"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373404"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49935"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-49935-bf21@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373402"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49936"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-49936-f434@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49942"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373421"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49942"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49942"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-49942-8f93@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373547"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49943"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49943"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-49943-7809@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49944"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373608"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49944"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49944"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-49944-b44c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49951"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373687"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49951"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061810-CVE-2022-49951-bc9b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49958"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373618"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49958"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49958"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061812-CVE-2022-49958-35f5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373521"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49959"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49959"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49959-d2b7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49960"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373614"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49960"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49960"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-49960-d554@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49961"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49961"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-49961-b7fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49962"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373582"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49962"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49962"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-49962-aced@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49964"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373491"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49964"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49964-ff03@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373583"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49965"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49965"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49965-08f3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373592"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49966"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-49966-6b06@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49967"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373651"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49967"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49967"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-49967-d167@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49969"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373635"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49969"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49969"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-49969-fd54@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49970"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373515"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49970"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49970"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-49970-2d63@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49971"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373584"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49971"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49971"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-49971-7e9c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49973"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373445"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49973"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49973"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061818-CVE-2022-49973-d4f3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49974"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061818-CVE-2022-49974-86bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49979"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373406"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49979"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49979"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061820-CVE-2022-49979-f695@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49980"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373443"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49980"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061820-CVE-2022-49980-982c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49981"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373552"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49981"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-49981-305f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49982"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373644"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49982"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-49982-cb7f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49983"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373495"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49983"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-49983-dd32@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49984"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49984"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49984"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061822-CVE-2022-49984-fa6b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49985"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49985"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49985"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061822-CVE-2022-49985-3e41@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373671"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49986"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49986"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061823-CVE-2022-49986-d434@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49990"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49990"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49990"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061824-CVE-2022-49990-a8af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49991"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373639"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49991"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49991"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061824-CVE-2022-49991-c44f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49992"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373483"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49992"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49992"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061825-CVE-2022-49992-c5f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49993"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373444"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49993"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061825-CVE-2022-49993-f53f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49994"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373407"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49994"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49994"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061825-CVE-2022-49994-e212@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49995"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373560"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49995"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49995"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061826-CVE-2022-49995-2d74@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49998"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49998"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061827-CVE-2022-49998-d4dd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50002"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373471"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50002"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50002-9e5f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50003"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373615"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50003"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50003"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061829-CVE-2022-50003-8a4c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373620"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50006"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061830-CVE-2022-50006-6d77@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50007"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50007"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50007"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061830-CVE-2022-50007-95d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50014"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373439"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50014"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50014-2936@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373591"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50015"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50015-4f7f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373563"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50016"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50016-ec03@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50020"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373630"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50020"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50020-6f27@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50021"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50021"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50021-2162@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373672"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50022"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50022-98b6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373467"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50028"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2022-50028-5f5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373641"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50029"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50029"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2022-50029-d0df@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50032"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50032"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50032"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50032-9d7e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50033"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373625"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50033"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50033-75f2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373665"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50034"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50034"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50034-0d64@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50035"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373595"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50035"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50035"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50035-ae6f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50037"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373420"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50037"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50037"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061841-CVE-2022-50037-ca44@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50039"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50039"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50039"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50039-7dd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50041"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50041"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50041"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50041-0e33@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50044"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373627"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50044"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50044"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50044-0b6b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50046"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373511"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50046"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50046"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061844-CVE-2022-50046-9cac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50049"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50049"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50049"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50049-f6d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50050"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373423"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50050"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50050"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50050-f90d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373497"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50051"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50051-57ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50052"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50052-d9f4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373553"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50053"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50054"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50054"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50054"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50054-a29e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50055"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373670"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50055"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50055-67ab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373509"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50058"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50058"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061848-CVE-2022-50058-212f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50068"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373573"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50068"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50068"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061852-CVE-2022-50068-25c3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373533"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50069"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50069"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061852-CVE-2022-50069-9dba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50070"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061853-CVE-2022-50070-87b5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50079"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373425"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50079"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061856-CVE-2022-50079-b3a5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50081"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373518"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50081"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50081"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061857-CVE-2022-50081-80dc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50083"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50086"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373611"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50086"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061858-CVE-2022-50086-6b94@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50088"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373678"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50088"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50088"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061859-CVE-2022-50088-32bf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373601"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50093"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061801-CVE-2022-50093-efbe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50100"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50100"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061803-CVE-2022-50100-bcf0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50111"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373484"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50111"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50111"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-50111-686f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50113"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373598"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50113"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50113"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061808-CVE-2022-50113-bdef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373624"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50120"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061811-CVE-2022-50120-992d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50122"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373656"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50122"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50122"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061811-CVE-2022-50122-c494@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50123"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373577"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50123"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061812-CVE-2022-50123-49ce@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50124"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373654"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50124"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50124"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061812-CVE-2022-50124-18c3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50125"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373585"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50125"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50125"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061812-CVE-2022-50125-5895@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373442"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50126"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50126"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-50126-5c77@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50129"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50129"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061814-CVE-2022-50129-dc2e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50131"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50131"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50131-4df3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373479"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50132"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50132"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50132-8e57@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373682"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50133"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50133-6189@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373548"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50136"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50136"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-50136-f85e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50137"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373514"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50137"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50137"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50137-c539@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50138"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373512"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50138"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50138"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50138-cd9d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50139"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373499"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50139"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50139"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061817-CVE-2022-50139-658f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50146"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373535"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50146"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50146"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061820-CVE-2022-50146-d641@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50147"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50147"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50147"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061820-CVE-2022-50147-40b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373637"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50148"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-50148-371d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50149"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373555"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50149"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-50149-5467@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373554"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50151"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061822-CVE-2022-50151-6132@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50152"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373430"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50152"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50152"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061822-CVE-2022-50152-a463@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50153"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50153"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061822-CVE-2022-50153-d408@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373454"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50154"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50154"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061823-CVE-2022-50154-0e68@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50156"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061824-CVE-2022-50156-3e2e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50157"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50157"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061824-CVE-2022-50157-14c2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50164"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373419"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50164"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50164"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061826-CVE-2022-50164-878e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50166"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061827-CVE-2022-50166-5ecc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373546"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50168"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2022-50168-bf75@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50172"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50172"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061829-CVE-2022-50172-0d81@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50181"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373666"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50181"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061833-CVE-2022-50181-f573@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50185"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373431"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50185"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50185"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061834-CVE-2022-50185-b741@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373414"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50189"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50189-75d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373636"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50190"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50190"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061836-CVE-2022-50190-5833@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50194"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373646"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50194"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061837-CVE-2022-50194-536e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50196"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373621"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50196"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50196"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061838-CVE-2022-50196-4ce9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50206"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373544"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50206"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50206"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061842-CVE-2022-50206-24d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373662"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50211"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50211"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50211-393a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50215"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50215"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061845-CVE-2022-50215-d5fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50219"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373517"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50219"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50219"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373496"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50221"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50221"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50221-1b80@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50224"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373498"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50224"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50224"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061848-CVE-2022-50224-7549@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373428"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50226"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50226"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061849-CVE-2022-50226-9c73@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50227"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373504"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50227"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50227"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061849-CVE-2022-50227-890e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50228"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373529"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50228"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50228"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061849-CVE-2022-50228-3904@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373460"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50229"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50229"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061850-CVE-2022-50229-702e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50235"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50241"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50241"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50241"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50241-0f92@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50243"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395428"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50243"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50243"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395365"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50263"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50263-040c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50271"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395311"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50271"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50271-2175@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395380"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50285"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50285"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50285-955c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50299"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395240"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50299"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50302"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50302"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50302-89ee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395351"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50306"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50306-c1da@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50308"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50308"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50308"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50308-8b1d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50318"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50318"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50318"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50325"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395270"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50325"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50326"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50326"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50326-7ffc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50344"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50344"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50344"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50344-8893@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395851"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50348"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50348"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50348-534c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395874"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50350"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50350"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50350-31bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50363"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50363"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50363"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50363-7e9b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396420"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50381"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50381"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50381-b83f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50385"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396432"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50385"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50385"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50385-7787@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396411"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50388"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50388-02a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396392"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50392"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50392"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50392-967e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396378"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50396"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50396"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50396-8b1b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50402"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50402"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50402"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50402-4c96@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50403"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396494"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50403"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50403"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50403-0471@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50405"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396526"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50405"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50405"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50405-8450@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396506"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50408"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50408"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396536"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50410"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50410"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396520"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50418"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50418"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50418-deac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400803"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50425"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50425"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50425-6722@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50427"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400751"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50427"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50427"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50427-87b9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400812"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50431"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50431"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50431-b165@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50436"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400725"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50436"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50436"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50436-ad37@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50439"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400726"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50439"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50439"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50439-6054@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50445"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400763"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50445"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50445"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50445-5873@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50452"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50452"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50452-055d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400713"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50459"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50459-2340@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50465"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400704"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50465"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50465"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50465-fb12@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50467"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400723"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50467"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50467"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50467-13ec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401488"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50484"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50484"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50487"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401498"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50487"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50487"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50496"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401534"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50496"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50496"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50506"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401575"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50506"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50506"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50506-1642@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50512"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402229"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50512"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50512"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50512-f95b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50516"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402307"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50516"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50516"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100703-CVE-2022-50516-3b07@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50530"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402291"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50530"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50530"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100707-CVE-2022-50530-ef6b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50531"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402274"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50531"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50531"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100707-CVE-2022-50531-a29b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50534"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50534"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50534"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100708-CVE-2022-50534-8900@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402240"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50546"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50546"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100757-CVE-2022-50546-ef71@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402251"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50549"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50549"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100758-CVE-2022-50549-cb07@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50554"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402306"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50554"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50554"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100700-CVE-2022-50554-f4fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50555"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402227"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50555"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50555"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100700-CVE-2022-50555-18e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405757"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50563"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50563"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50563-995f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50569"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405765"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50569"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50569"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50569-fdd1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405744"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50580-68e3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419864"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50583"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50583"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2022-50583-a25a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50615"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50615-5c90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50622"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419941"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50622"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50622-9f34@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50635"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420274"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50635"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120935-CVE-2022-50635-b2b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50668"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420350"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50668"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120945-CVE-2022-50668-153a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50678"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50678"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50678"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120949-CVE-2022-50678-53a4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50679"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420330"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50679"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120949-CVE-2022-50679-b2b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50698"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50698"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50698-0d67@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424985"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50702"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50702"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50702-c339@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50703"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424949"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50703"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50703"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50703-1c22@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50714"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425004"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50714"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50714"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50714-32b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50715"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425055"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50715"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50715"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50715-5640@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50717"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50717"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50717"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50717-dc68@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425009"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50723"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50723"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50723-a62d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425054"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50726"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50726"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50726-2f42@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50730"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425043"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50730"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50730"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50730-a4ca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50738"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425101"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50738"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50738-d561@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50744"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50744-bc80@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50752"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50752"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50752-fa82@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50768"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425080"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50768"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50768"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50768-2703@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50773"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425174"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50773"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50773-b946@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50778"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425136"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50778"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50778"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50778-0b9a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50783"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425114"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50783"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50783-3109@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50816"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426225"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50816"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123014-CVE-2022-50816-3fda@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426258"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50833"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50833"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50833-92af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50835"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426077"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50835"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50835"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50835-a5ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50839"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426156"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50839"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50839"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123019-CVE-2022-50839-eca8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50843"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426213"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50843"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50843"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50843-ae87@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50855"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426188"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50855"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50855"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123046-CVE-2022-50855-7845@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50861"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426034"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50861"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50861"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123048-CVE-2022-50861-0a1c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50863"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426100"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50863"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50863"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123048-CVE-2022-50863-7f8b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426212"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50866"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50866-6082@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50889"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50889"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50889-71c4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0394"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0394"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/18/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0461"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0590"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0590"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1195"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1195"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1382"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1382"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1382"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187953"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2177"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2193097"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2513"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-22998"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-22998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22998"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52340"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52340"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52340"},{"type":"ARTICLE","url":"https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2306433"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52905"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52905"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024082113-CVE-2023-52905-53fd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53020"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355434"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53020"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53020-1042@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355484"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53021"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53021"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53021-def9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53029"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53029"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53029-a670@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53030"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355471"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53030"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53030"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53030-ba50@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53033"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355437"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53033"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53033-9089@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363754"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53064"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050211-CVE-2023-53064-fe53@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53083"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363709"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53083"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050217-CVE-2023-53083-5b4e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53273"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395699"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53273"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091622-CVE-2023-53273-b873@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396406"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53381"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53381"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53381-a774@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53393"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396376"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53393"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53393"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53393-5e45@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53552"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401514"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53552"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53552"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401548"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53606"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53606"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53606-8c1a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53634"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53634"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100714-CVE-2023-53634-8155@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53765"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53765"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53765"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53765-0317@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53809"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420256"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53809"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53809"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120944-CVE-2023-53809-ca78@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53811"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420237"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53811"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53811"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120944-CVE-2023-53811-dc26@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21867"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355334"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-21867"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21867"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032732-CVE-2025-21867-3138@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38393"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383408"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38393"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38393"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38393-f2e8@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-284.11.1.el9_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:2458.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}