{"id":"RHSA-2023:6583","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-04-08T10:31:46.456166223Z","published":"2024-09-16T11:04:21Z","upstream":["CVE-2021-47515","CVE-2022-3523","CVE-2022-3565","CVE-2022-3594","CVE-2022-38457","CVE-2022-40133","CVE-2022-40982","CVE-2022-42895","CVE-2022-48950","CVE-2022-48975","CVE-2022-48988","CVE-2022-48991","CVE-2022-48997","CVE-2022-49028","CVE-2022-49220","CVE-2022-49256","CVE-2022-49257","CVE-2022-49273","CVE-2022-49287","CVE-2022-49316","CVE-2022-49321","CVE-2022-49339","CVE-2022-49344","CVE-2022-49466","CVE-2022-49567","CVE-2022-49653","CVE-2022-49687","CVE-2022-49699","CVE-2022-49715","CVE-2022-49716","CVE-2022-49731","CVE-2022-49746","CVE-2022-49748","CVE-2022-49750","CVE-2022-49752","CVE-2022-49759","CVE-2022-49760","CVE-2022-49773","CVE-2022-49774","CVE-2022-49795","CVE-2022-49811","CVE-2022-49827","CVE-2022-49837","CVE-2022-49839","CVE-2022-49855","CVE-2022-49864","CVE-2022-49873","CVE-2022-49875","CVE-2022-49878","CVE-2022-49882","CVE-2022-49885","CVE-2022-49938","CVE-2022-50004","CVE-2022-50005","CVE-2022-50042","CVE-2022-50064","CVE-2022-50066","CVE-2022-50072","CVE-2022-50076","CVE-2022-50087","CVE-2022-50091","CVE-2022-50107","CVE-2022-50110","CVE-2022-50117","CVE-2022-50127","CVE-2022-50135","CVE-2022-50191","CVE-2022-50200","CVE-2022-50201","CVE-2022-50234","CVE-2022-50239","CVE-2022-50246","CVE-2022-50247","CVE-2022-50249","CVE-2022-50250","CVE-2022-50258","CVE-2022-50269","CVE-2022-50272","CVE-2022-50275","CVE-2022-50276","CVE-2022-50279","CVE-2022-50287","CVE-2022-50290","CVE-2022-50295","CVE-2022-50297","CVE-2022-50303","CVE-2022-50317","CVE-2022-50318","CVE-2022-50322","CVE-2022-50327","CVE-2022-50329","CVE-2022-50341","CVE-2022-50342","CVE-2022-50351","CVE-2022-50354","CVE-2022-50356","CVE-2022-50357","CVE-2022-50361","CVE-2022-50369","CVE-2022-50372","CVE-2022-50389","CVE-2022-50390","CVE-2022-50391","CVE-2022-50393","CVE-2022-50406","CVE-2022-50412","CVE-2022-50416","CVE-2022-50423","CVE-2022-50426","CVE-2022-50429","CVE-2022-50440","CVE-2022-50444","CVE-2022-50453","CVE-2022-50458","CVE-2022-50460","CVE-2022-50464","CVE-2022-50470","CVE-2022-50472","CVE-2022-50473","CVE-2022-50475","CVE-2022-50477","CVE-2022-50479","CVE-2022-50482","CVE-2022-50488","CVE-2022-50489","CVE-2022-50494","CVE-2022-50505","CVE-2022-50510","CVE-2022-50515","CVE-2022-50520","CVE-2022-50527","CVE-2022-50528","CVE-2022-50532","CVE-2022-50535","CVE-2022-50536","CVE-2022-50540","CVE-2022-50543","CVE-2022-50544","CVE-2022-50550","CVE-2022-50556","CVE-2022-50558","CVE-2022-50562","CVE-2022-50578","CVE-2022-50582","CVE-2022-50616","CVE-2022-50617","CVE-2022-50619","CVE-2022-50626","CVE-2022-50627","CVE-2022-50628","CVE-2022-50630","CVE-2022-50632","CVE-2022-50633","CVE-2022-50636","CVE-2022-50639","CVE-2022-50643","CVE-2022-50645","CVE-2022-50650","CVE-2022-50658","CVE-2022-50667","CVE-2022-50671","CVE-2022-50675","CVE-2022-50677","CVE-2022-50699","CVE-2022-50700","CVE-2022-50701","CVE-2022-50704","CVE-2022-50705","CVE-2022-50710","CVE-2022-50712","CVE-2022-50718","CVE-2022-50721","CVE-2022-50724","CVE-2022-50728","CVE-2022-50733","CVE-2022-50735","CVE-2022-50740","CVE-2022-50750","CVE-2022-50756","CVE-2022-50760","CVE-2022-50771","CVE-2022-50772","CVE-2022-50781","CVE-2022-50784","CVE-2022-50809","CVE-2022-50817","CVE-2022-50819","CVE-2022-50820","CVE-2022-50822","CVE-2022-50823","CVE-2022-50824","CVE-2022-50825","CVE-2022-50829","CVE-2022-50832","CVE-2022-50842","CVE-2022-50844","CVE-2022-50847","CVE-2022-50856","CVE-2022-50862","CVE-2022-50865","CVE-2022-50878","CVE-2022-50881","CVE-2022-50882","CVE-2022-50883","CVE-2022-50885","CVE-2023-0597","CVE-2023-1073","CVE-2023-1074","CVE-2023-1075","CVE-2023-1076","CVE-2023-1077","CVE-2023-1079","CVE-2023-1206","CVE-2023-1249","CVE-2023-1252","CVE-2023-1380","CVE-2023-1652","CVE-2023-1838","CVE-2023-1855","CVE-2023-1989","CVE-2023-2156","CVE-2023-2269","CVE-2023-26545","CVE-2023-30456","CVE-2023-3141","CVE-2023-3161","CVE-2023-3212","CVE-2023-3268","CVE-2023-33203","CVE-2023-3358","CVE-2023-33951","CVE-2023-33952","CVE-2023-35825","CVE-2023-3609","CVE-2023-3640","CVE-2023-3772","CVE-2023-3773","CVE-2023-39191","CVE-2023-4155","CVE-2023-4194","CVE-2023-4206","CVE-2023-4207","CVE-2023-4208","CVE-2023-4273","CVE-2023-52707","CVE-2023-52734","CVE-2023-52735","CVE-2023-52928","CVE-2023-52931","CVE-2023-52937","CVE-2023-52938","CVE-2023-52977","CVE-2023-52981","CVE-2023-52986","CVE-2023-52988","CVE-2023-52991","CVE-2023-52992","CVE-2023-52993","CVE-2023-52994","CVE-2023-52997","CVE-2023-53002","CVE-2023-53006","CVE-2023-53009","CVE-2023-53010","CVE-2023-53012","CVE-2023-53013","CVE-2023-53014","CVE-2023-53015","CVE-2023-53024","CVE-2023-53025","CVE-2023-53026","CVE-2023-53028","CVE-2023-53031","CVE-2023-53036","CVE-2023-53038","CVE-2023-53039","CVE-2023-53042","CVE-2023-53044","CVE-2023-53050","CVE-2023-53051","CVE-2023-53053","CVE-2023-53056","CVE-2023-53058","CVE-2023-53060","CVE-2023-53065","CVE-2023-53070","CVE-2023-53071","CVE-2023-53072","CVE-2023-53073","CVE-2023-53077","CVE-2023-53078","CVE-2023-53079","CVE-2023-53084","CVE-2023-53085","CVE-2023-53086","CVE-2023-53087","CVE-2023-53088","CVE-2023-53089","CVE-2023-53090","CVE-2023-53095","CVE-2023-53096","CVE-2023-53100","CVE-2023-53102","CVE-2023-53103","CVE-2023-53105","CVE-2023-53107","CVE-2023-53108","CVE-2023-53110","CVE-2023-53112","CVE-2023-53113","CVE-2023-53114","CVE-2023-53116","CVE-2023-53120","CVE-2023-53121","CVE-2023-53124","CVE-2023-53126","CVE-2023-53129","CVE-2023-53132","CVE-2023-53168","CVE-2023-53171","CVE-2023-53185","CVE-2023-53188","CVE-2023-53197","CVE-2023-53198","CVE-2023-53205","CVE-2023-53211","CVE-2023-53213","CVE-2023-53218","CVE-2023-53224","CVE-2023-53229","CVE-2023-53232","CVE-2023-53233","CVE-2023-53241","CVE-2023-53245","CVE-2023-53254","CVE-2023-53268","CVE-2023-53292","CVE-2023-53296","CVE-2023-53299","CVE-2023-53319","CVE-2023-53320","CVE-2023-53333","CVE-2023-53334","CVE-2023-53359","CVE-2023-53363","CVE-2023-53366","CVE-2023-53372","CVE-2023-53376","CVE-2023-53383","CVE-2023-53390","CVE-2023-53392","CVE-2023-53398","CVE-2023-53400","CVE-2023-53408","CVE-2023-53409","CVE-2023-53410","CVE-2023-53422","CVE-2023-53430","CVE-2023-53431","CVE-2023-53433","CVE-2023-53437","CVE-2023-53443","CVE-2023-53453","CVE-2023-53461","CVE-2023-53464","CVE-2023-53466","CVE-2023-53477","CVE-2023-53479","CVE-2023-53489","CVE-2023-53492","CVE-2023-53499","CVE-2023-53511","CVE-2023-53512","CVE-2023-53517","CVE-2023-53521","CVE-2023-53524","CVE-2023-53532","CVE-2023-53549","CVE-2023-53553","CVE-2023-53556","CVE-2023-53561","CVE-2023-53563","CVE-2023-53566","CVE-2023-53575","CVE-2023-53576","CVE-2023-53578","CVE-2023-53582","CVE-2023-53591","CVE-2023-53594","CVE-2023-53598","CVE-2023-53602","CVE-2023-53605","CVE-2023-53607","CVE-2023-53609","CVE-2023-53620","CVE-2023-53623","CVE-2023-53624","CVE-2023-53625","CVE-2023-53626","CVE-2023-53634","CVE-2023-53635","CVE-2023-53639","CVE-2023-53640","CVE-2023-53641","CVE-2023-53643","CVE-2023-53646","CVE-2023-53656","CVE-2023-53669","CVE-2023-53670","CVE-2023-53671","CVE-2023-53675","CVE-2023-53677","CVE-2023-53678","CVE-2023-53679","CVE-2023-53705","CVE-2023-53706","CVE-2023-53710","CVE-2023-53716","CVE-2023-53717","CVE-2023-53746","CVE-2023-53753","CVE-2023-53755","CVE-2023-53756","CVE-2023-53760","CVE-2023-53764","CVE-2023-53767","CVE-2023-53780","CVE-2023-53786","CVE-2023-53789","CVE-2023-53792","CVE-2023-53795","CVE-2023-53803","CVE-2023-53814","CVE-2023-53816","CVE-2023-53832","CVE-2023-53852","CVE-2023-53866","CVE-2023-53867","CVE-2023-54004","CVE-2023-54011","CVE-2023-54015","CVE-2023-54024","CVE-2023-54029","CVE-2023-54034","CVE-2023-54036","CVE-2023-54037","CVE-2023-54040","CVE-2023-54041","CVE-2023-54043","CVE-2023-54053","CVE-2023-54055","CVE-2023-54057","CVE-2023-54071","CVE-2023-54073","CVE-2023-54074","CVE-2023-54085","CVE-2023-54088","CVE-2023-54092","CVE-2023-54097","CVE-2023-54098","CVE-2023-54102","CVE-2023-54108","CVE-2023-54123","CVE-2023-54129","CVE-2023-54131","CVE-2023-54144","CVE-2023-54174","CVE-2023-54176","CVE-2023-54191","CVE-2023-54195","CVE-2023-54200","CVE-2023-54202","CVE-2023-54206","CVE-2023-54216","CVE-2023-54233","CVE-2023-54234","CVE-2023-54238","CVE-2023-54239","CVE-2023-54245","CVE-2023-54259","CVE-2023-54262","CVE-2023-54265","CVE-2023-54269","CVE-2023-54270","CVE-2023-54273","CVE-2023-54275","CVE-2023-54276","CVE-2023-54286","CVE-2023-54294","CVE-2023-54300","CVE-2023-54306","CVE-2023-54308","CVE-2023-54309","CVE-2023-54317","CVE-2023-54320","CVE-2023-54321","CVE-2023-54325","CVE-2024-0443","CVE-2024-26649","CVE-2024-57876"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/7027704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2008229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2063818"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143906"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165926"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2169343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2169719"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2172087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173403"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173430"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174224"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175323"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175903"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176140"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176554"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178741"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179877"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180124"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181134"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2181277"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182031"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2183556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185945"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188468"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2192667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2203922"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207969"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213199"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213485"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214348"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215362"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217659"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217964"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218944"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221609"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223719"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225201"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226783"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2229498"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-406"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6583.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47515"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47515"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052431-CVE-2021-47515-5c06@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3523"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3523"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3523"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16ce101db85db694a91380aa4c89b25530871d33"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3565"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3594"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3594"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38457"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40982"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40982"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42895"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42895"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42895"},{"type":"ARTICLE","url":"https://github.com/google/security-research/security/advisories/GHSA-vccx-8h74-2357"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48950"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320683"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48950"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48950"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48950-dc5f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48975"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320704"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48975"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48975-d7f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48988"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320681"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48988"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48988"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48991"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320713"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48991"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48991"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48991-3987@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48997"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320774"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48997"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48997"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48997-cd65@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320673"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49028"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49028-78e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348260"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49220"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49220"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022621-CVE-2022-49220-7247@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347705"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49256"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49256"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49256-042d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348185"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49257"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49257"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022627-CVE-2022-49257-351f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49273"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348294"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49273"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022630-CVE-2022-49273-61de@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49287"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348089"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49287"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49287"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2022-49287-2ed9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347650"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49316"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49316"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2022-49316-3e10@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49321"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2022-49321-6cf0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49339"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348103"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49339"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49339"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2022-49339-8220@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49344"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49344"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49344"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2022-49344-2b3a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347704"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49466"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49466"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2022-49466-d3cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49567"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347961"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49567"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2022-49567-6118@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348147"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49653"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49653"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022620-CVE-2022-49653-f6b6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348177"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49687"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49687"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022626-CVE-2022-49687-bcfa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348099"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49699"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49699"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022628-CVE-2022-49699-d60e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49715"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49715"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49715"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022631-CVE-2022-49715-429c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49716"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49716"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49716"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022631-CVE-2022-49716-7528@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49731"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49731"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2022-49731-c7ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49746"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355504"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49746"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49746"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49746-251b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49748"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49748"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49748-4658@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355480"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49750"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49750-743d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49752"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49752"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49752-19a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355497"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49759"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49759-5392@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355517"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49760"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49760-97be@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49773"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363477"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49773"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050116-CVE-2022-49773-2f2e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49774"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363497"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49774"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49774"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050116-CVE-2022-49774-e5d3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49795"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49795"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050124-CVE-2022-49795-e512@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49811"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49811"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49811"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050129-CVE-2022-49811-cb0b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49827"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49827"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49827"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050135-CVE-2022-49827-f7bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363505"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49837"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49837"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2022-49837-c13b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49839"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363370"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49839"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49839"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2022-49839-37b0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49855"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363369"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49855"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49855"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050145-CVE-2022-49855-502a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49864"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363495"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49864"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49864"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050148-CVE-2022-49864-a6b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49873"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363467"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49873"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49873"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050151-CVE-2022-49873-2733@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363423"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49875"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49875"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050152-CVE-2022-49875-9422@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363443"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49878"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050153-CVE-2022-49878-1e05@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49882"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363408"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49882"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050155-CVE-2022-49882-6046@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49885"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363361"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49885"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050156-CVE-2022-49885-efae@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49938"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373401"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49938"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061848-CVE-2022-49938-3c2f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50004"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373469"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50004"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061829-CVE-2022-50004-88ff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373478"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50005"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50005"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061829-CVE-2022-50005-fd4b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373691"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50042"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373475"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50064"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061850-CVE-2022-50064-70a7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50066"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373683"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50066"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061851-CVE-2022-50066-a2ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50072"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373562"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50072"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061853-CVE-2022-50072-de2b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50076"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50076"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061855-CVE-2022-50076-f930@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373539"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50087"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50087"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061859-CVE-2022-50087-53b1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373532"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50091"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50091"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061800-CVE-2022-50091-fddc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50107"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061806-CVE-2022-50107-76ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50110"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50110"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061807-CVE-2022-50110-5027@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373626"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50117"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50117"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061810-CVE-2022-50117-7322@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50127"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373477"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50127"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50127"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061813-CVE-2022-50127-df59@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50135"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373655"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50135"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50135"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061816-CVE-2022-50135-585a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373587"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50191"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50191"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061836-CVE-2022-50191-8c6c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373605"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50200"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061839-CVE-2022-50200-51f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50201"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373649"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50201"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50201"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50201-7b57@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50234"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395290"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50234"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50234"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091545-CVE-2022-50234-bd01@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395336"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50239"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50239-3908@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395442"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50246"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50246"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50246-d173@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395393"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50247"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50247"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50247-1ab7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395318"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50249"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50249"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50249-bfbe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50250"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395437"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50250"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50250"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50250-1be1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50258"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395431"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50258"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50258"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50258-1497@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50269"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395226"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50269"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50269"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50269-24d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395349"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50272"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50272-4120@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395356"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50275"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50275"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50275-2ef2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50276"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395292"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50276"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50276"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50276-e9a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50279"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395294"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50279"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50279"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50279-412b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50287"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395279"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50287"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50287"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50287-a3ce@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395417"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50290"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50290-a7af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50295"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50295"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50295"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50295-8141@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395412"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50297"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50297"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50297-974e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50303"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395264"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50303"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50303"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50303-7759@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50317"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50317"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50317-6b3b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50318"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50318"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50318"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395433"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50322"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50322-079d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50327"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395438"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50327"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50327-5d27@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50329"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395242"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50329"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50329"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50329-58ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50341"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091638-CVE-2022-50341-12c1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395876"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50342"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50342"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50342-d7ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50351"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395872"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50351"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50351"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50351-ac59@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396109"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50354"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50354"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50354-45cc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396152"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50356"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50356"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50356-fe76@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396105"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50357"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50357"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50357-4ae9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396119"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50361"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50361"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50361-60ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396112"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50369"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50369"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50369-bc92@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396108"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50372"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50372"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50372-e3b5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50389"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50389"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50389"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50389-17eb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396433"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50390"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50390-742c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50391"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396395"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50391"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50391-7caa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50393"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396403"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50393"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50393"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50393-d5da@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50406"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50406"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50412"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50412"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50412-0f2e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50416"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396499"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50416"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50416"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50416-886a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50423"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50423"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50423-5a66@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50426"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50426"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50426-a61b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400731"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50429"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50429"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50429-4bc6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400740"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50440"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50440"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50440-1afd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400708"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50444"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50444"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2022-50444-9b11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50453"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50453"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50453-204a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50458"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50458-4fa8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50460"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50460"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50460"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50460-2149@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50464"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400807"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50464"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50464-3c96@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50470"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50470"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50470"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2022-50470-e56f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50472"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50472"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50472-5d91@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50473"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50473"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50473"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50473-a1fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50475"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401529"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50475"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50475"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50477"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401470"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50477"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50477"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50477-1815@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50479"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50479"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50479-de1c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50482"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401576"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50482"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50482"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401551"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50488"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50488"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100413-CVE-2022-50488-32e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50489"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401549"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50489"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50489-9d88@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50494"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401563"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50494"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50494"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50494-00a0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50505"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50505"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50505"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50505-b427@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50510"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50510"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50510"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50510-c055@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402292"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50515"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50515"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100702-CVE-2022-50515-fff8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402219"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50520"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50520"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100704-CVE-2022-50520-9faa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50527"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50527"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50527"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100706-CVE-2022-50527-de17@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50528"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50528"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100706-CVE-2022-50528-1d20@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50532"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402298"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50532"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50532"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100708-CVE-2022-50532-430b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50535"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402308"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50535"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100753-CVE-2022-50535-a9a9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402257"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50536"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50540"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50540"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100755-CVE-2022-50540-46a8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50543"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100756-CVE-2022-50543-597d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402269"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50544"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100757-CVE-2022-50544-f012@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50550"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402244"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50550"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50550"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100759-CVE-2022-50550-7147@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405727"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102203-CVE-2022-50556-bbe2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50558"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405782"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50558"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50558"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50558-444f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50562"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405754"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50562"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50562"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50562-5b54@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405724"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50578-eb90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50582"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50582"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50582"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2022-50582-1ac9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419958"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50616"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50616"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50616-bef8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50617"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419926"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50617"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50617-84c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50619"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419867"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50619"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50619-9b47@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419873"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50626"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50626"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50626-a97f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419908"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50627"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50627"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50627-a907@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50628"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50628"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50628-69d3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50630"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419847"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50630"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50630"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50630-3891@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420245"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50632"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120934-CVE-2022-50632-97fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50633"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420258"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50633"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120934-CVE-2022-50633-8c49@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420272"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50636"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120935-CVE-2022-50636-6d4d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50639"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120935-CVE-2022-50639-789f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50643"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50643"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120936-CVE-2022-50643-74ca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50645"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50645"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120936-CVE-2022-50645-2014@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50650"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50650"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120937-CVE-2022-50650-fbae@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420335"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50658"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50658"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120941-CVE-2022-50658-77b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420343"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50667"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50667"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120945-CVE-2022-50667-01f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420356"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120946-CVE-2022-50671-e025@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50675"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420374"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50675"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120948-CVE-2022-50675-9032@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50677"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50677"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50677"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120948-CVE-2022-50677-d2c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424969"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50699"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50699"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50699-ddde@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424994"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50700"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50700"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50700-9cf6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424982"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50701"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50701"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50701-32f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424995"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50704"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50704"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50704-ca2b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50705"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424993"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50705"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50705"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50705-8196@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425001"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50710"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50710-3f0d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425036"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50712"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50712"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2022-50712-6c0d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50718"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425005"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50718"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50718"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50718-a890@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425058"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50721"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50721-9683@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425053"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50724"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50724"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50724-f625@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50728"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425065"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50728"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50728"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50728-afa8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50733"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425032"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50733"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50733"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50733-a587@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425064"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50735"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50735-2929@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50740"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425119"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50740"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50740"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50740-a780@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425171"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50750"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50750-5395@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425209"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50756"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50756-ce43@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425086"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50760"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50760-b793@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425092"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50771"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50771"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50771-3440@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50772"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50772-774d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50781"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425091"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50781"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50781-3d18@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426259"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50784"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50784"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2022-50784-ee54@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50809"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50809"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50809"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123012-CVE-2022-50809-e4a0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50817"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50817-55d8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50819"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50819"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50819"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50819-361a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50820"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50820"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50820"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2022-50820-c3d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426224"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50822"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50822"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2022-50822-2187@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50823"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50823"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50823"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50823-8c3a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50824"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426221"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50824"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50824"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50824-8dc8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50825"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426214"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50825"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50825-905f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50829"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426123"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50829"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50829"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50829-2142@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50832"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426025"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50832"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50832"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2022-50832-4207@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50842"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50842"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50842"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50842-e43a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426172"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50844"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50844"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50844-64ab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426170"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50847"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50847"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2022-50847-6766@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50856"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426165"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50856"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50856"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123046-CVE-2022-50856-af64@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50862"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426043"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50862"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50862"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123048-CVE-2022-50862-124f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50865"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426226"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50865"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50865"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50865-281e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426019"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50878"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2022-50878-2067@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50881"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50881"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2022-50881-88e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50882"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50882"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2022-50882-6f82@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50883"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2022-50883-09fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50885"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426080"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50885"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50885-c207@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0597"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0597"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/Yz%2FmfJ1gjgshF19t@hirez.programming.kicks-ass.net/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1073"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=b12fece4c64857e5fab4290bf01b2e0317a88456"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/17/3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1074"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/01/23/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1076"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1076"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1077"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2173436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1077"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1077"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1079"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1206"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1206"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1206"},{"type":"ARTICLE","url":"https://git.kernel.org/linus/d11b0df7ddf1831f3e170972f43186dad520bfcc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1249"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1249"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1249"},{"type":"ARTICLE","url":"https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_@email.froward.int.ebiederm.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1252"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1252"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1252"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1380"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1380"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang@yonsei.ac.kr/T/#u"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/03/14/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1652"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1652"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1652"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1838"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2087568"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1838"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1838"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang@redhat.com/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1855"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1855"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1989"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196292"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2156"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/05/17/6"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-547/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2269"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2189388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2269"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2269"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV@redhat.com/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3141"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3161"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3161"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3161"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3212"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3212"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3212"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3268"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3268"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3268"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3358"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3358"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3358"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3609"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3609"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217523"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3640"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3773"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3773"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4194"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4206"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4206"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4206"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8"},{"type":"ARTICLE","url":"https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4207"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4207"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4207"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4208"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4208"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4273"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4273"},{"type":"ARTICLE","url":"https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-26545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-26545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26545"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-30456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-30456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33203"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33951"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33951"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-33952"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-33952"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33952"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-35825"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-35825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35825"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39191"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39191"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39191"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282615"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52707"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52707"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52707-e048@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52734"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282728"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52734"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52734"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052100-CVE-2023-52734-c8c2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282618"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52735"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052100-CVE-2023-52735-4df1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355443"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52928"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52928"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-52928-e380@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52931"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52931"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52931-593f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52937"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355512"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52937"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52937"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52937-605d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52938"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355518"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52938"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52938-ee34@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52977"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52977"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52977-f91d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52981"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355444"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52981"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52981-070c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355490"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52986"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52986"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52986-91fe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52988"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355431"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52988"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52988"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52988-5520@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52991"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52991"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52991"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52991-6358@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52992"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355487"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52992"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52992"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52992-bf46@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52993"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52993"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52993-3697@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52994"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355509"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52994"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52994"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52994-5336@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52997"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355468"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52997"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52997"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52997-dbca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53002"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53002"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53002-1f76@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355432"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53006"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53006-209f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53009"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355526"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53009"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53009"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53009-82cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53010"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355506"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53010"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53010-56af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53012"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53012"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53012"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53012-597c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53013"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355508"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53013"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53013"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53013-58dc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53014"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355473"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53014"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53014-700f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355491"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53015"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53015-f139@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53024"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53024"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53024-8d19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53025"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355446"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53025"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53025"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53025-5662@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53026"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53026"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53026-0e24@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53028"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53028-8be6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53031"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355516"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53031"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53031"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53031-39cd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53036"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53036"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53036"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050201-CVE-2023-53036-db6a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53038"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53038"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53038"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050201-CVE-2023-53038-4b5c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53039"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53039"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53039"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050202-CVE-2023-53039-7efe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363793"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53042"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050203-CVE-2023-53042-e4e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53044"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53044"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53044"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050203-CVE-2023-53044-2d25@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53050"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363751"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53050"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53050"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050206-CVE-2023-53050-6072@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363688"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53051"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050206-CVE-2023-53051-dff1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53053"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050207-CVE-2023-53053-bb9d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363729"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53056"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53056"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050208-CVE-2023-53056-35a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363697"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53058"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53058"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050208-CVE-2023-53058-a2e2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363748"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53060"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050209-CVE-2023-53060-7b1c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53065"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363704"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53065"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53065"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050211-CVE-2023-53065-0292@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363685"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53070"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050213-CVE-2023-53070-d7b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53071"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363775"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53071"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53071"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050213-CVE-2023-53071-8d91@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53072"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53072"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050213-CVE-2023-53072-4ab2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53073"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363699"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53073"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050214-CVE-2023-53073-a450@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53077"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363752"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53077"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53077"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050215-CVE-2023-53077-4075@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363707"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53078"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050216-CVE-2023-53078-45e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53079"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363732"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53079"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050216-CVE-2023-53079-448b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363784"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53084"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050218-CVE-2023-53084-b380@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53085"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363692"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53085"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050218-CVE-2023-53085-c37a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53086"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363740"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53086"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050218-CVE-2023-53086-a21d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363680"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53087"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53087"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050219-CVE-2023-53087-8c1d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53088"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363766"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53088"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53088"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050219-CVE-2023-53088-501c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363736"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53089"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53089"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050219-CVE-2023-53089-b8c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53090"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363760"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53090"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53090"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050220-CVE-2023-53090-69c1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363792"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53095"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53095"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050222-CVE-2023-53095-5782@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53096"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363764"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53096"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050222-CVE-2023-53096-42c2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363785"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53100"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53100"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050223-CVE-2023-53100-f480@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53102"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363719"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53102"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53102"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050224-CVE-2023-53102-13fd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53103"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363728"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53103"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53103"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050224-CVE-2023-53103-9c37@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53105"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363776"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53105"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53105"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050225-CVE-2023-53105-7c94@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363720"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53107"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050226-CVE-2023-53107-ef59@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363769"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53108"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050226-CVE-2023-53108-d921@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53110"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53110"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050227-CVE-2023-53110-2b28@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53112"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363788"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53112"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53112"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050228-CVE-2023-53112-f86a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53113"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363683"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53113"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53113"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050228-CVE-2023-53113-a3ff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53114"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53114"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53114"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050228-CVE-2023-53114-39ab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53116"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363763"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53116"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53116"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050229-CVE-2023-53116-469c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363681"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53120"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050231-CVE-2023-53120-8e03@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53121"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363691"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53121"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050231-CVE-2023-53121-40ec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53124"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363714"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53124"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53124"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050232-CVE-2023-53124-9900@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363703"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53126"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53126"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050233-CVE-2023-53126-a7ec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53129"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363783"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53129"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050234-CVE-2023-53129-038a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363737"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53132"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53132"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050235-CVE-2023-53132-2281@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395329"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53168"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53168-7628@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53171"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53171"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53171-be9f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53185"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395297"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53185"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53185"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53185-2f8d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53188"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395416"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53188"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53188-373f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53197"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53197"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53197"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53197-1f23@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53198"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395229"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53198"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53198"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53198-094a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395415"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53205"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53205"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53205-9a2b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53211"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53211"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53211-6015@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53213"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395267"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53213"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53213-dfc5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53218"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395284"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53218"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53218"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53218-0fca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53224"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395241"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53224"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53224"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53224-190d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53229"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53229"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53229-a0ef@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53232"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53232"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53232"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53232-39fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395339"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53233"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53233-8c6b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53241"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395306"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53241"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53241"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53241-c75a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53245"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395372"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53245"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53245"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53245-256b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53254"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53254"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53254"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53254-0aa0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53268"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395685"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53268"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53268"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091603-CVE-2023-53268-3820@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53292"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091626-CVE-2023-53292-24e9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53296"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395682"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53296"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53296"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091627-CVE-2023-53296-9947@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53299"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395677"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53299"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091628-CVE-2023-53299-cd27@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53319"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395869"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53319"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53319-4fd2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53320"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53320"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53320"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53320-d419@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53333"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395885"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53333"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53333"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091646-CVE-2023-53333-f2b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395888"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53334"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53334"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091646-CVE-2023-53334-bd19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396144"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53359"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53359"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53359-0569@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53363"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396117"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53363"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53363"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53363-4ac2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53366"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396126"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53366"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53366"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53366-c8e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396405"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53372"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53372"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53372-4d9e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53376"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53376"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53376-d18b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396396"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53383"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53383-fea9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396398"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53390"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53390-8eb5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53392"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53392"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53392-9703@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396421"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53398"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53398"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53398-2464@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396390"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53400"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53400"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53400-2d47@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53408"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53408"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53408-5a18@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53409"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396454"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53409"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53409-818d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53410"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53410"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53410-4483@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53422"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396527"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53422"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53422"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53422-8cca@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53430"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396497"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53430"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53430"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53430-4aaa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396534"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53431"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53431"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53431-7eac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396528"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53433"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53433"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53433-fc43@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53437"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396504"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53437"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53437"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53437-7993@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53443"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53443"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53443-6815@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400769"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53453"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53453"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53453-c36d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53461"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400692"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53461"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53461-b02b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53464"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400753"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53464"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53464-a397@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53466"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400700"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53466"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53466"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53466-dcff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53477"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400802"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53477"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53477"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53477-93d5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53479"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53479"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53479-5c70@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53489"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400741"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53489"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53489-eec5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400758"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53492"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53492"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53492-18fd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53499"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53499"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53499"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53499-0e6a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53511"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53511"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53511"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53511-99e8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53512"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53512"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53512"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53512-10c7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53517"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53517"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53517-da77@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53521"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400814"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53521"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53521"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53521-15e2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53524"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400791"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53524"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53524"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53524-d438@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53532"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53532"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53532"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100137-CVE-2023-53532-1627@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401491"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53549"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53549"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53549-9c74@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53553"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401552"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53553"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53553"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53553-f661@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401478"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53556"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53556-db4c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401506"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53561"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53561"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53561-75a1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401571"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53563"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53563"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53563-5cbe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53566"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401550"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53566"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53566"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53566-1c57@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53575"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401487"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53575"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53575"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53575-2079@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53576"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401524"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53576"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53576"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53576-c5dd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53578-7dbf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53582"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401559"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53582"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53582"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53582-3ed8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53591"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401459"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53591"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53591"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53591-8496@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53594"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401494"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53594"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53594"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53594-563f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53598"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53598"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53602"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401460"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53602"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53602"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53602-2de6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53605"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401553"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53605"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53605"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53605-a660@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53607"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401517"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53607"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53607"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53607-9638@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53609"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401490"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53609"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53609"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53609-1c39@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53620"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402268"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53620"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53620"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100709-CVE-2023-53620-3924@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53623"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100710-CVE-2023-53623-2687@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402296"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53624"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53624"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100711-CVE-2023-53624-7a7c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402211"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53625"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53625"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100711-CVE-2023-53625-3f41@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402253"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53626"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53626"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100711-CVE-2023-53626-24ed@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53634"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53634"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100714-CVE-2023-53634-8155@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53635"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402285"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53635"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100714-CVE-2023-53635-de6f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402248"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53639"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53639"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100715-CVE-2023-53639-2919@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402258"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53640"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100715-CVE-2023-53640-3db3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53641"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402188"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53641"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53641"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100716-CVE-2023-53641-ed0e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402186"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53643"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53643"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100716-CVE-2023-53643-4725@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402234"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53646"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100717-CVE-2023-53646-c40e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53656"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402196"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53656"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53656"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2023-53656-1a7b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53669"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402224"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53669"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100705-CVE-2023-53669-f81f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53670"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53670"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53670"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100705-CVE-2023-53670-46fe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402261"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100705-CVE-2023-53671-a34e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53675"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402293"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53675"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100707-CVE-2023-53675-e7ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53677"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53677"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53677"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100707-CVE-2023-53677-1cc8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53678"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53678"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53678"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100708-CVE-2023-53678-b370@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53679"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402215"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53679"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100708-CVE-2023-53679-929a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53705"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405713"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53705"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53705"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53705-38d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405714"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53706"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53706"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53706-18d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405752"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53710"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53710-68d7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53716"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405728"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53716"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53716"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53716-4265@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53717"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405741"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53717"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53717"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53717-e88c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53746"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419839"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53746"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53746"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53746-cbfd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53753"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53753"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53753"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53753-1a11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419836"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53755"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53755"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53755-1c4b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419865"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53756"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53756-f234@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53760"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53760-8e04@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53764"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419850"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53764"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53764"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53764-c257@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53767"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53767"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53767"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53767-02ae@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420287"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53780"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120939-CVE-2023-53780-914d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420253"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53786"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120940-CVE-2023-53786-3c1a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420250"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53789"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120940-CVE-2023-53789-c5cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420273"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53792"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53792"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120941-CVE-2023-53792-3de7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53795"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53795"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120941-CVE-2023-53795-f912@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53803"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420240"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53803"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53803"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120943-CVE-2023-53803-0ff9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53814"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420298"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53814"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53814"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120945-CVE-2023-53814-eccb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53816"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420281"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53816"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53816"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120945-CVE-2023-53816-e869@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53832"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53832"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53832"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120954-CVE-2023-53832-6d46@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53852"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420338"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53852"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120901-CVE-2023-53852-69a1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53866"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420336"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53866"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120907-CVE-2023-53866-59ec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53867"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424984"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53867"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53867"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-53867-cb3e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54004"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424964"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54004"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54004-34a0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54011"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54011"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54011-258c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424936"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54015"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54015-13a3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424961"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54024"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54024"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122434-CVE-2023-54024-30aa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424963"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54029"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54029"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122436-CVE-2023-54029-0d67@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54034"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54034"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122438-CVE-2023-54034-3089@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54036"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54036"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54036"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122438-CVE-2023-54036-ae42@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54037"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424959"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54037"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54037"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122439-CVE-2023-54037-0d5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54040"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424992"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54040"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54040"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122440-CVE-2023-54040-83dd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54041"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424997"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54041"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54041"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122440-CVE-2023-54041-57f4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54043"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425077"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54043"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54043"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54043-16c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425011"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54053"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54053-9a4e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54055"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425033"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54055"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54055"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54055-3b5f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425015"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54057"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54057"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54057-f0c5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54071"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54071"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54071"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54071-b4c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54073"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425056"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54073"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54073-249f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54074"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425019"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54074"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54074-cf89@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54085"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54085"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54085-7e32@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54088"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425095"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54088"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54088"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54088-f00f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54092"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425173"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54092"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54092"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54092-91ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425132"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54097"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54097-3fb1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54098"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54098"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54098"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54098-d7c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54102"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54102"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54102"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54102-7dd5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425113"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54108"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54108-d5be@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54123"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425082"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54123"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54123"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54123-4e1b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54129"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425090"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54129"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54129-8cb3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54131"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54131"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54131-87b3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54144"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425138"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54144"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54144"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54144-f3be@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426192"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54174"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54174"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54174-1ff6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54176"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426134"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54176"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54176-efc2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54191"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54191"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54191-3204@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426218"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54195"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54195"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54195-07d1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426169"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54200"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54200"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54200-8bbb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54202"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426132"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54202"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54202"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54202-1932@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54206"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426193"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54206"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54206"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54206-1057@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426241"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54216"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54216"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54216-93c5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426124"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54233"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54233-1e82@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54234"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426202"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54234"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54234"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54234-bb5c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426125"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54238"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54238"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54238-87c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54239"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54239"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54239"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54239-07d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54245"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426063"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54245"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54245"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123052-CVE-2023-54245-fc10@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426250"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54259"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54259"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123057-CVE-2023-54259-64ee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54262"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426037"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54262"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54262"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123058-CVE-2023-54262-4f66@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54265"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426032"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54265"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123059-CVE-2023-54265-02a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54269"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426013"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54269"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54269"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123000-CVE-2023-54269-6fd7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426112"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54270"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54270"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123000-CVE-2023-54270-cdd0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54273"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426162"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54273"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123001-CVE-2023-54273-29ea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426243"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54275"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54275"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54275-728d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54276"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426117"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54276"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54276"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54276-06b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54286"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54286"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54286"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54286-efd5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426149"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54294"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54294-e7ac@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54300"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54300"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54300"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54300-5746@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426248"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54306"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54306-e40f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54308"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426114"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54308"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54308"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123035-CVE-2023-54308-5d83@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54309"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54309"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123035-CVE-2023-54309-4435@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426017"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54317"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54317"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123037-CVE-2023-54317-4750@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54320"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426195"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54320"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54320"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2023-54320-465d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426138"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54321"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54321-b87f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54325"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426061"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54325"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2023-54325-3e5c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257968"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0443"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0443"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271796"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26649"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-57876"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337142"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-57876"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57876"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025011107-CVE-2024-57876-1d02@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-362.8.1.el9_3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6583.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}