{"id":"RHSA-2024:2394","summary":"Red Hat Security Advisory: kernel security, bug fix, and enhancement update","modified":"2026-04-02T10:47:47.078341995Z","published":"2024-09-24T08:51:43Z","upstream":["CVE-2020-26555","CVE-2021-47579","CVE-2022-0480","CVE-2022-38096","CVE-2022-45934","CVE-2022-48632","CVE-2022-48947","CVE-2022-49011","CVE-2022-49322","CVE-2022-49350","CVE-2022-49721","CVE-2022-49744","CVE-2022-49754","CVE-2022-49940","CVE-2022-49977","CVE-2022-50080","CVE-2022-50116","CVE-2022-50202","CVE-2022-50277","CVE-2022-50286","CVE-2022-50313","CVE-2022-50318","CVE-2022-50374","CVE-2022-50377","CVE-2022-50447","CVE-2022-50453","CVE-2022-50485","CVE-2022-50637","CVE-2022-50638","CVE-2022-50642","CVE-2022-50673","CVE-2022-50736","CVE-2022-50777","CVE-2022-50780","CVE-2022-50782","CVE-2022-50845","CVE-2022-50879","CVE-2023-24023","CVE-2023-25775","CVE-2023-28464","CVE-2023-28866","CVE-2023-31083","CVE-2023-3567","CVE-2023-37453","CVE-2023-39189","CVE-2023-39193","CVE-2023-39194","CVE-2023-39198","CVE-2023-4133","CVE-2023-42754","CVE-2023-42756","CVE-2023-45863","CVE-2023-46862","CVE-2023-51043","CVE-2023-51779","CVE-2023-51780","CVE-2023-52434","CVE-2023-52448","CVE-2023-52450","CVE-2023-52469","CVE-2023-52470","CVE-2023-52476","CVE-2023-52478","CVE-2023-52486","CVE-2023-52489","CVE-2023-52522","CVE-2023-52529","CVE-2023-52574","CVE-2023-52578","CVE-2023-52580","CVE-2023-52581","CVE-2023-52597","CVE-2023-52610","CVE-2023-52620","CVE-2023-52628","CVE-2023-52817","CVE-2023-52832","CVE-2023-52881","CVE-2023-52934","CVE-2023-52939","CVE-2023-52940","CVE-2023-52973","CVE-2023-52976","CVE-2023-52984","CVE-2023-52985","CVE-2023-52999","CVE-2023-53004","CVE-2023-53016","CVE-2023-53017","CVE-2023-53018","CVE-2023-53019","CVE-2023-53046","CVE-2023-53047","CVE-2023-53052","CVE-2023-53057","CVE-2023-53094","CVE-2023-53097","CVE-2023-53134","CVE-2023-53140","CVE-2023-53148","CVE-2023-53149","CVE-2023-53150","CVE-2023-53151","CVE-2023-53152","CVE-2023-53164","CVE-2023-53180","CVE-2023-53181","CVE-2023-53184","CVE-2023-53192","CVE-2023-53193","CVE-2023-53202","CVE-2023-53204","CVE-2023-53208","CVE-2023-53209","CVE-2023-53210","CVE-2023-53221","CVE-2023-53228","CVE-2023-53235","CVE-2023-53237","CVE-2023-53246","CVE-2023-53248","CVE-2023-53252","CVE-2023-53256","CVE-2023-53258","CVE-2023-53263","CVE-2023-53270","CVE-2023-53275","CVE-2023-53280","CVE-2023-53285","CVE-2023-53288","CVE-2023-53290","CVE-2023-53293","CVE-2023-53297","CVE-2023-53304","CVE-2023-53309","CVE-2023-53317","CVE-2023-53321","CVE-2023-53322","CVE-2023-53335","CVE-2023-53338","CVE-2023-53343","CVE-2023-53352","CVE-2023-53354","CVE-2023-53365","CVE-2023-53370","CVE-2023-53371","CVE-2023-53380","CVE-2023-53384","CVE-2023-53394","CVE-2023-53415","CVE-2023-53421","CVE-2023-53441","CVE-2023-53442","CVE-2023-53444","CVE-2023-53451","CVE-2023-53465","CVE-2023-53471","CVE-2023-53473","CVE-2023-53476","CVE-2023-53479","CVE-2023-53487","CVE-2023-53490","CVE-2023-53513","CVE-2023-53525","CVE-2023-53527","CVE-2023-53530","CVE-2023-53536","CVE-2023-53539","CVE-2023-53544","CVE-2023-53545","CVE-2023-53546","CVE-2023-53547","CVE-2023-53552","CVE-2023-53553","CVE-2023-53559","CVE-2023-53563","CVE-2023-53570","CVE-2023-53577","CVE-2023-53580","CVE-2023-53581","CVE-2023-53585","CVE-2023-53586","CVE-2023-53611","CVE-2023-53612","CVE-2023-53615","CVE-2023-53621","CVE-2023-53628","CVE-2023-53632","CVE-2023-53645","CVE-2023-53646","CVE-2023-53647","CVE-2023-53649","CVE-2023-53652","CVE-2023-53655","CVE-2023-53657","CVE-2023-53660","CVE-2023-53661","CVE-2023-53663","CVE-2023-53664","CVE-2023-53665","CVE-2023-53666","CVE-2023-53673","CVE-2023-53677","CVE-2023-53696","CVE-2023-53709","CVE-2023-53711","CVE-2023-53713","CVE-2023-53722","CVE-2023-53726","CVE-2023-53730","CVE-2023-53743","CVE-2023-53751","CVE-2023-53761","CVE-2023-53762","CVE-2023-53784","CVE-2023-53791","CVE-2023-53795","CVE-2023-53806","CVE-2023-53810","CVE-2023-53813","CVE-2023-53819","CVE-2023-53821","CVE-2023-53823","CVE-2023-53833","CVE-2023-53842","CVE-2023-53843","CVE-2023-53844","CVE-2023-53847","CVE-2023-53848","CVE-2023-53857","CVE-2023-53860","CVE-2023-53863","CVE-2023-53990","CVE-2023-53992","CVE-2023-53993","CVE-2023-53995","CVE-2023-53999","CVE-2023-54003","CVE-2023-54006","CVE-2023-54008","CVE-2023-54014","CVE-2023-54016","CVE-2023-54021","CVE-2023-54022","CVE-2023-54026","CVE-2023-54028","CVE-2023-54030","CVE-2023-54031","CVE-2023-54033","CVE-2023-54035","CVE-2023-54038","CVE-2023-54048","CVE-2023-54052","CVE-2023-54060","CVE-2023-54062","CVE-2023-54064","CVE-2023-54069","CVE-2023-54070","CVE-2023-54072","CVE-2023-54076","CVE-2023-54090","CVE-2023-54091","CVE-2023-54096","CVE-2023-54100","CVE-2023-54106","CVE-2023-54120","CVE-2023-54135","CVE-2023-54137","CVE-2023-54141","CVE-2023-54145","CVE-2023-54148","CVE-2023-54154","CVE-2023-54155","CVE-2023-54156","CVE-2023-54160","CVE-2023-54166","CVE-2023-54169","CVE-2023-54170","CVE-2023-54173","CVE-2023-54179","CVE-2023-54184","CVE-2023-54186","CVE-2023-54197","CVE-2023-54201","CVE-2023-54214","CVE-2023-54215","CVE-2023-54221","CVE-2023-54229","CVE-2023-54235","CVE-2023-54242","CVE-2023-54251","CVE-2023-54254","CVE-2023-54260","CVE-2023-54261","CVE-2023-54263","CVE-2023-54274","CVE-2023-54283","CVE-2023-54289","CVE-2023-54292","CVE-2023-54296","CVE-2023-54302","CVE-2023-54303","CVE-2023-54312","CVE-2023-54316","CVE-2023-54324","CVE-2023-54326","CVE-2023-6040","CVE-2023-6121","CVE-2023-6176","CVE-2023-6531","CVE-2023-6546","CVE-2023-6622","CVE-2023-6915","CVE-2023-6931","CVE-2023-6932","CVE-2024-0565","CVE-2024-0841","CVE-2024-1085","CVE-2024-1086","CVE-2024-25744","CVE-2024-26582","CVE-2024-26583","CVE-2024-26584","CVE-2024-26585","CVE-2024-26586","CVE-2024-26593","CVE-2024-26602","CVE-2024-26609","CVE-2024-26633","CVE-2024-26649","CVE-2024-26671","CVE-2024-26830","CVE-2025-38053"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1918601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188102"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2213132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221039"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221463"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2226788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231410"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239848"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246980"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250043"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254982"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255498"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258013"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262127"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267041"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267758"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269217"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270080"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270118"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270883"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-15897"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-15937"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-16024"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-17986"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-19081"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-2376"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-2421"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-2907"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-3923"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-6012"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-7936"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-9127"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2394.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26555"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26555"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26555"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47579"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293250"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47579"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47579"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024061915-CVE-2021-47579-4f78@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0480"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0480"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0480"},{"type":"ARTICLE","url":"https://github.com/kata-containers/kata-containers/issues/3373"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38096"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45934"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277840"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48632"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024042854-CVE-2022-48632-465f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-48947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-48947"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48947"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48947-0ab5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49011"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2320778"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49011"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49011"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347717"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49322"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2022-49322-b0f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348007"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49350"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49350"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2022-49350-c5d2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348109"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49721"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022632-CVE-2022-49721-b74f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355495"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49744"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49744-8c5a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49754"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355528"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49754"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49754"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49754-cc36@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49940"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373397"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49940"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49940"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061848-CVE-2022-49940-181b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49977"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373574"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49977"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061819-CVE-2022-49977-3826@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50080"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373446"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50080"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50080"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061856-CVE-2022-50080-a32c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50116"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373692"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50116"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50116"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061809-CVE-2022-50116-bf10@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50202"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373411"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50202"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50202"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061840-CVE-2022-50202-48e0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50277"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395401"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50277"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50277"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50277-085f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50286"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50286"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50286"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50286-b313@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50313"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395304"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50313"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50313"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50313-2fa9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50318"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50318"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50318"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396106"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50374"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50374"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50374-6da4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50377"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50377"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50377-f43b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50447"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400804"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50447"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50447"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50447-4de6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400743"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50453"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50453"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50453-204a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50485"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50485"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50485"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50485-9d4c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50637"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420275"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50637"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50637"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120935-CVE-2022-50637-f1b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50638"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420266"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50638"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50638"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120935-CVE-2022-50638-fb89@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420291"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50642"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120936-CVE-2022-50642-6975@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50673"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420347"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50673"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120947-CVE-2022-50673-f920@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50736"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425020"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50736"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50736"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2022-50736-1cb3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50777"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50777"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50777-d1e3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50780"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50780-bc90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425085"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50782"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50782"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50782-d849@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426024"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50845"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50845"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2022-50845-367a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-50879"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426076"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-50879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50879"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2022-50879-47a7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3567"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3567"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/stable-commits/msg285184.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6040"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6040"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6040"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2024/01/12/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6121"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6176"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6531"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6531"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6531"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/c716c88321939156909cfa1bd8b0faaf1c804103.1701868795.git.asml.silence@gmail.com/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6546"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6546"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6546"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6622"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6622"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6915"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6915"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6915"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6931"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-6932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24023"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24023"},{"type":"ARTICLE","url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25775"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-25775"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25775"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28464"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28464"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/03/28/2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28866"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=95084403f8c070ccf5d7cbe72352519c1798a40a"},{"type":"ARTICLE","url":"https://lore.kernel.org/lkml/20230321015018.1759683-1-iam@sung-woo.kim/"},{"type":"ARTICLE","url":"https://patchwork.kernel.org/project/bluetooth/patch/20230322232543.3079578-1-luiz.dentz@gmail.com"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-31083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-31083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31083"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/bluetooth/hci_ldisc.c?h=v6.6-rc7&id=9c33663af9ad115f90c076a1828129a3fbadea98"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-37453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-37453"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37453"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39189"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39193"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39193"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39193"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39194"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39194"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39194"},{"type":"ARTICLE","url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39198"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39198"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42754"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42754"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42754"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2023/q4/14"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42756"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2023/q3/242"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45863"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-45863"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45863"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-46862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-46862"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46862"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51043"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51043"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51043"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51779"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-51780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-51780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51780"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52434"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52434"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52434"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52448"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022255-CVE-2023-52448-7bf2@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52450"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265649"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52450"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52450"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022256-CVE-2023-52450-48ba@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52469"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52469"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52469"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52470"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266358"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52470"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52470"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52476"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52476"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52476"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52478"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267036"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52478"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52478"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52486"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52486"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52486"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-27-lee@kernel.org/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52489"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-30-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52522"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52522"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52522"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52529"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52529"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52529"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52529-56ff@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52574"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52574"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52574"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52574-a423@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52578"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52578"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52578"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52578-50cb@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52580"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52580-c37e@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52581"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52581-2165@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52597"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268311"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52597"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030646-CVE-2023-52597-2ed6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52610"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52610"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52610"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240318100758.2828621-10-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52620"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52620"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52620"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032147-CVE-2023-52620-11a9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272041"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52628"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52628"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024032850-CVE-2023-52628-14fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282676"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52817"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52832"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282645"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52832"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52832"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052108-CVE-2023-52832-b9d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52881"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258875"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52881"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20231205161841.2702925-1-edumazet@google.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052941-CVE-2023-52881-4283@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355463"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52934"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52934-bd3c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52939"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52939"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52939-8bb1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52940"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355488"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52940"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52940"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52940-2e53@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52973"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355433"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52973"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52973"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2023-52973-a993@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355514"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52976"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52976-eda3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52984"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355472"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52984"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52984"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52984-19ad@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52985"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355496"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52985"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52985"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52985-3f52@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355485"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52999"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52999"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52999-e28e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53004"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355465"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53004"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53004-e58b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355451"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53016"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53016-f30c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355494"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53017"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53017"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53017-8dd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53018"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355511"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53018"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53018"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53018-c89c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53019"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2355493"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53019"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53019"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53019-441a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53046"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363700"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53046"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53046"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050204-CVE-2023-53046-f1fc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53047"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363689"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53047"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53047"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050204-CVE-2023-53047-7e31@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363695"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53052"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050206-CVE-2023-53052-41f8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363734"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53057"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53057"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050208-CVE-2023-53057-71cc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363768"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53094"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53094"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050221-CVE-2023-53094-a015@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53097"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050222-CVE-2023-53097-fd46@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53134"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363705"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53134"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53134"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050235-CVE-2023-53134-68c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53140"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2363767"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53140"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53140"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025050238-CVE-2023-53140-a5f2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395231"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53148"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53148-e1b8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53149"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395246"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53149"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53149-2f0a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53150"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53150"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53150-29b0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53151"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53151-263e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53152"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395307"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53152"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53152"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53152-130d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53164"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395350"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53164"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53164"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53164-3a5d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395333"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53180"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53180-5e16@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53181"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395369"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53181"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53184"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395376"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53184"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53184-3b7a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53192"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395232"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53192"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53192"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53193"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53193"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53193"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53193-74f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53202"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395326"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53202"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53202"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53202-5e01@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395332"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53204"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53204"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53204-3e15@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53208"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53208-b31d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53209"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395321"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53209"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53209"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53209-ed9e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53210"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395424"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53210"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53210"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53210-0e06@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395223"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53221"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53221"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53221-c23e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53228"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395430"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53228"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53228"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53228-441c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395384"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53235"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53235-1104@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53237"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395288"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53237"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53237"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53237-7d1b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395404"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53246"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53246"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53246-a539@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395250"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53248"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53248"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53248-aa39@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53252"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395337"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53252"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53252"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53252-3a4f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395313"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53256"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53256"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53256-d5af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53258"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395426"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53258"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53258"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53258-35f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395660"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53263"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091600-CVE-2023-53263-9abe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395662"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53270"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53270"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091603-CVE-2023-53270-4af2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53275"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53275"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091623-CVE-2023-53275-3ac4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53280"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395680"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53280"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091624-CVE-2023-53280-30a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395666"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53285"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53285"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091625-CVE-2023-53285-7cb1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53288"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395665"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53288"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091625-CVE-2023-53288-b799@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53290"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091626-CVE-2023-53290-34e0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53293"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395674"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53293"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53293"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091626-CVE-2023-53293-73cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395681"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53297"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53297"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091627-CVE-2023-53297-8746@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53304"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395846"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53304"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53304"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53304-9a57@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395882"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53309"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53309"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53309-005a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53317"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395887"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53317"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53317"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53317-c945@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395890"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53321"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53321-0003@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2395891"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53322"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53322-45ba@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53335"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396111"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53335"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53335"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2023-53335-1e5d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53338"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53338"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53338-8224@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396136"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53343"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53343"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53343-880b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53352"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396113"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53352"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53352"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53352-9be5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396158"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53354"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53354"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091721-CVE-2023-53354-771f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53365"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396130"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53365"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53365"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53365-acb1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53370"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396394"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53370"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53370"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53370-1085@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396397"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53371"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53371"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53371-e5f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396425"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53380"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53380"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53380-b2e0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53384"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396428"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53384"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53384"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53384-042e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53394"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396380"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53394"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53394-dd17@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53415"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396466"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53415"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53415"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53415-ea27@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396500"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53421"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53421"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53421-0dd9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53441"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396508"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53441"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53441"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53441-0641@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53442"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396501"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53442"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53442"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53442-8a1f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53444"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53444"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53444-41d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400701"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53451"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53451"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53451-bb02@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53465"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400759"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53465"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53465"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53465-eb0b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53471"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400800"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53471"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53471"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53471-09f6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53473"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400719"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53473"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53473"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53473-bf5d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400821"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53476"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53476"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53476-d6d3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53479"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53479"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53479-5c70@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53487"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400784"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53487"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53487"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2023-53487-c3f7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400760"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53490"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53490"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53490-c90f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400795"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53513"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53513"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53513-4667@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53525"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53525"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53525"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53525-ee57@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53527"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400787"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53527"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53527"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53527-3ce7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53530"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2400733"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53530"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53530"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53530-853b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401532"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53536"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53536-0e4f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53539"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401510"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53539"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53539"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401474"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53544"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53544-f48f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53545"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401539"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53545"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53545-8d50@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401561"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53546"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53546"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53546-a432@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53547"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401511"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53547"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53547"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53547-38ce@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53552"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401514"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53552"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53552"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53553"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401552"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53553"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53553"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53553-f661@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53559"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53559"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53559-c2f0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53563"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401571"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53563"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53563"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53563-5cbe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53570"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401560"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53570"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53570"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53570-3733@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401573"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53577"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53577"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53577-96e9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401476"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53580"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53580"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2023-53580-7d16@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53581"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53581-80fa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53585"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401495"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53585"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53585"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53585-b855@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53586"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53586-67e1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53611"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401557"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53611"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53611"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53611-a508@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401502"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53612"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53612"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53612-b146@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53615"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2401469"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53615"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53615-843c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53621"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402239"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53621"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100710-CVE-2023-53621-b6f9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402243"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53628"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53628"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100712-CVE-2023-53628-a5b2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402254"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53632"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100713-CVE-2023-53632-d2de@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402284"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53645"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53645"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100717-CVE-2023-53645-6c08@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402234"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53646"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53646"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100717-CVE-2023-53646-c40e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402235"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53647"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53647-c01f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402214"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53649"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53649-0a4a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402279"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53652"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53652"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100719-CVE-2023-53652-d67a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53655"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402218"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53655"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2023-53655-d389@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402281"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53657"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53657"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2023-53657-d0c7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53660"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53660"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53660"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100702-CVE-2023-53660-92d3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53661"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402245"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53661"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53661"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100702-CVE-2023-53661-6142@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402209"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53663"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100703-CVE-2023-53663-0a4e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402206"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53664"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100703-CVE-2023-53664-a38d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53665"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402216"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53665"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53665"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100704-CVE-2023-53665-3411@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53666"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100704-CVE-2023-53666-62bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53673"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402193"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53673"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53673"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100706-CVE-2023-53673-36b9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53677"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53677"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53677"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025100707-CVE-2023-53677-1cc8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53696"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53696"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53696-dadf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53709"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405758"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53709"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53709"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53709-553a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53711"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53711"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53711-24c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53713"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405753"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53713"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53713"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53713-550a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53722"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53722"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53722"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53722-f3ab@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53726"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405768"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53726"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53726"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53726-29cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53730"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405738"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53730"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53730"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53730-d257@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419914"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53743"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53743"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120840-CVE-2023-53743-5da6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53751"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419858"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53751"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53751"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53751-2ff2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419892"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53761"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53761"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53761-ea1d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419838"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53762"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53762"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420246"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53784"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53784"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120939-CVE-2023-53784-a381@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53791"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420251"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53791"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53791"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120941-CVE-2023-53791-a2ea@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53795"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53795"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120941-CVE-2023-53795-f912@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53806"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420232"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53806"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53806"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120943-CVE-2023-53806-03cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53810"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53810"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53810"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120944-CVE-2023-53810-e48e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53813"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420286"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53813"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53813"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120944-CVE-2023-53813-cd16@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53819"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420264"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53819"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53819"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120945-CVE-2023-53819-15be@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53821"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420329"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53821"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53821"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53821-9542@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53823"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420361"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53823"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53823"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120950-CVE-2023-53823-c6fe@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420366"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53833"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53833"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120954-CVE-2023-53833-09d9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53842"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420310"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53842"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53842"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120957-CVE-2023-53842-d1e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53843"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53843"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53843"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120958-CVE-2023-53843-195d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420316"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53844"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53844"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120958-CVE-2023-53844-92b4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420349"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53847"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53847"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120959-CVE-2023-53847-1f94@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53848"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420331"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53848"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53848"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120900-CVE-2023-53848-8cd8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53857"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53857"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53857"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120903-CVE-2023-53857-5513@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53860"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420339"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53860"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53860"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120904-CVE-2023-53860-3722@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53863"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2420333"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53863"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53863"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025120905-CVE-2023-53863-8742@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53990"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424954"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53990"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53990"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-53990-b239@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53992"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424955"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53992"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53992"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-53992-d45e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53993"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424965"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53993"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-53993-7ec2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53995"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424967"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53995"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53995"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-53995-1860@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-53999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-53999"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53999"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-53999-57a4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54003"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424996"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54003"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54003"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54003-01b7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425000"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54006"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54006-d646@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54008"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54008"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54008"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54008-cfde@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54014"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424950"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54014"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54014-9b8c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424971"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54016"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54016-522e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54021"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54021"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54021-15bf@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424937"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54022"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122434-CVE-2023-54022-ae26@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54026"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54026"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122435-CVE-2023-54026-123c@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54028"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54028"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122436-CVE-2023-54028-2399@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54030"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424968"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54030"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54030"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122436-CVE-2023-54030-e7f3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54031"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424991"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54031"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54031"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122437-CVE-2023-54031-90af@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54033"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424986"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54033"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54033"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122437-CVE-2023-54033-ad11@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54035"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424970"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54035"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54035"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122438-CVE-2023-54035-76a5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54038"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2424931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54038"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54038"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122439-CVE-2023-54038-41bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54048"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425013"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54048"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54048-ea7d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54052"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54052-302d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425045"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54060"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54060-2029@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54062"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425016"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54062"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54062-d861@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54064"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425018"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54064"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54064-7509@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425063"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54069"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54069"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54069-1a17@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425050"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54070"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54070-6104@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54072"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425014"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54072"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54072-4a34@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54076"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54076"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54076-e317@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54090"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425098"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54090"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54090"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54090-2944@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54091"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54091"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54091-577a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54096"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425131"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54096"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54096-efde@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425099"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54100"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54100"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54100-91a9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54106"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425199"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54106"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54106"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54106-b8da@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425183"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54120"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54120"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54120-d966@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54135"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425167"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54135"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54135"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54135-ffa3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54137"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425187"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54137"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54137"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54137-1873@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54141"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425142"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54141"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54141-86e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54145"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54145-421d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54148"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425103"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54148"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54148-569b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54154"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54154"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54154-bc1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54155"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425206"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54155"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54155-e238@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54156"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425100"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54156"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54156"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54156-832a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54160"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2425143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54160"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54160"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54160-ed90@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426051"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54166"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123019-CVE-2023-54166-baff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54169"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426227"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54169"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54169"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2023-54169-21bb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54170"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426038"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54170"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54170"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2023-54170-f1c6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54173"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54173"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54173"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2023-54173-2f44@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426244"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54179"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54179-e6e3@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54184"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426090"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54184"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54184-e958@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54186"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54186"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54186"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54186-a9c9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54197"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426140"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54197"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54197"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54197-aeec@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54201"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426049"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54201"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54201"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54201-3f26@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426069"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54214"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54214-c4a6@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54215"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426168"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54215"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54215"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54215-d1c0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426031"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54221"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54221"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54221-567b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426256"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54229"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54229"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54229-80e7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426233"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54235"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54235-51bc@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426210"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54242"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54242"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54242-9771@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54251"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426020"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54251"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54251"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123054-CVE-2023-54251-2a3b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54254"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426011"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54254"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54254"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123055-CVE-2023-54254-8a3e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54260"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426234"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54260"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54260"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123057-CVE-2023-54260-cc1d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54261"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54261"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54261"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123057-CVE-2023-54261-0331@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426033"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54263"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54263"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123058-CVE-2023-54263-0976@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54274"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426026"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54274"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54274"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54274-79a7@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54283"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54283-b319@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54289"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426167"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54289"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54289"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54289-5309@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426208"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54292"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54292-26cb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54296"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54296"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54296"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54296-e667@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426187"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54302"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54302"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54302-a9e9@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54303"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426113"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54303"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54303"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54303-0e92@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426190"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54312"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54312"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123036-CVE-2023-54312-8b23@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426135"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54316"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54316"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123037-CVE-2023-54316-f3c8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54324"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54324"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54324"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2023-54324-7149@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-54326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426228"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-54326"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54326"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2023-54326-43b2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0565"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0565"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0565"},{"type":"ARTICLE","url":"https://www.spinics.net/lists/stable-commits/msg328851.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0841"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-0841"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0841"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-1085"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-1085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1085"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7"},{"type":"ARTICLE","url":"https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-1086"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-1086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1086"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660"},{"type":"ARTICLE","url":"https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-25744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263875"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-25744"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25744"},{"type":"ARTICLE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26582"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26582"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26582"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022139-spruce-prelude-c358@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26583"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26583"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26583"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022146-traction-unjustly-f451@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26584"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26584"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26584"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022148-showpiece-yanking-107c@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26585"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26585"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26585"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022150-fancy-numerate-94ab@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26586"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26586"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26586"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022253-CVE-2024-26586-6632@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26593"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26593"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26593"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022315-CVE-2024-26593-9d89@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26602"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26602"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26602"},{"type":"ARTICLE","url":"https://github.com/torvalds/linux/commit/944d5fe50f3f03daacfea16300e656a1691c4a23"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022414-CVE-2024-26602-5e76@gregkh/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26609"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26633"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240318100758.2828621-16-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271796"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26649"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272811"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26671"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040219-CVE-2024-26671-2543@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275596"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26830"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26830"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26830-5bc0@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-38053"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-38053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38053"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025061832-CVE-2025-38053-e145@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::crb","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::nfv","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.3.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-64k-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-64k-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debug-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debug-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-kvm","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-rt-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-rt-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-uki-virt","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-uki-virt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-devel-matched","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel-matched"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-core","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/libperf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"libperf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/libperf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rtla","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/rtla"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}},{"package":{"name":"rv","ecosystem":"Red Hat:enterprise_linux:9::realtime","purl":"pkg:rpm/redhat/rv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.0-427.13.1.el9_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2394.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}