{"id":"RHSA-2024:4211","summary":"Red Hat Security Advisory: kernel security and bug fix update","modified":"2026-04-21T10:03:15Z","published":"2024-09-28T00:45:40Z","upstream":["CVE-2020-26555","CVE-2021-46909","CVE-2021-46972","CVE-2021-47069","CVE-2021-47073","CVE-2021-47236","CVE-2021-47310","CVE-2021-47311","CVE-2021-47353","CVE-2021-47356","CVE-2021-47456","CVE-2021-47495","CVE-2022-49057","CVE-2023-5090","CVE-2023-52464","CVE-2023-52560","CVE-2023-52615","CVE-2023-52626","CVE-2023-52667","CVE-2023-52669","CVE-2023-52675","CVE-2023-52686","CVE-2023-52700","CVE-2023-52703","CVE-2023-52781","CVE-2023-52813","CVE-2023-52835","CVE-2023-52877","CVE-2023-52878","CVE-2023-52881","CVE-2024-26583","CVE-2024-26584","CVE-2024-26585","CVE-2024-26656","CVE-2024-26675","CVE-2024-26735","CVE-2024-26759","CVE-2024-26801","CVE-2024-26804","CVE-2024-26826","CVE-2024-26859","CVE-2024-26906","CVE-2024-26907","CVE-2024-26974","CVE-2024-26982","CVE-2024-27397","CVE-2024-27410","CVE-2024-35789","CVE-2024-35835","CVE-2024-35838","CVE-2024-35845","CVE-2024-35852","CVE-2024-35853","CVE-2024-35854","CVE-2024-35855","CVE-2024-35888","CVE-2024-35890","CVE-2024-35958","CVE-2024-35959","CVE-2024-35960","CVE-2024-36004","CVE-2024-36007","CVE-2024-42159"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4211"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1918601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2248122"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265520"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2265800"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2266831"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267518"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2267730"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271680"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272692"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272829"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275604"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275633"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275635"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275733"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281113"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281157"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281251"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281253"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281255"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281257"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281272"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281311"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281346"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281689"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281920"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281925"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2281986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282394"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282471"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282609"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282612"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282680"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282902"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282920"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4211.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-26555"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-26555"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26555"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46909"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46909"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46909"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b"},{"type":"ARTICLE","url":"https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46972"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46972"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46972"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46972-2ec2@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47069"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47069"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47069"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47069-5797@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47073"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47073-704a@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47236"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47236"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47236"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47310"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47310"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47310"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052128-CVE-2021-47310-a59d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47311"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47311"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47311"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052129-CVE-2021-47311-47f4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47353"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47353"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47353"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47353-8d3a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47356"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47356"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47356"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052142-CVE-2021-47356-a3d4@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47456"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47456-dc47@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-47495"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-47495"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-47495"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47495-a5f8@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-49057"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2348326"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-49057"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49057"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2025022652-CVE-2022-49057-94a2@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5090"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-5090"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5090"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52464"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52464"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2023-52464-b17c@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52560"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52560"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52560"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52560-c3de@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52615"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52615"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52615"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240318101458.2835626-10-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52626"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52626"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52626"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-12-lee@kernel.org/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52667"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52667"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52667"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52669"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52669-5a58@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52675"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051749-CVE-2023-52675-4d66@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52686"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52686"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52686"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051752-CVE-2023-52686-4a08@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52700"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52700"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52700"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052156-CVE-2023-52700-1e45@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52703"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52703"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52703"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052157-CVE-2023-52703-abcb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52781"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52781"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052153-CVE-2023-52781-8f04@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52813"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52813"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52813"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052103-CVE-2023-52813-0704@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52835"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52835"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52835"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052109-CVE-2023-52835-80ee@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52877"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52877"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2023-52877-0826@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52878"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52878"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2023-52878-d433@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-52881"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-52881"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52881"},{"type":"ARTICLE","url":"https://lore.kernel.org/all/20231205161841.2702925-1-edumazet@google.com/"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052941-CVE-2023-52881-4283@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26583"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26583"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26583"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022146-traction-unjustly-f451@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26584"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26584"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26584"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022148-showpiece-yanking-107c@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26585"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26585"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26585"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024022150-fancy-numerate-94ab@gregkh/T/#u"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26656"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26656"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26656"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040247-CVE-2024-26656-ffaa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26675"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040252-CVE-2024-26675-5b19@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26735"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26759"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26759"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040304-CVE-2024-26759-45f1@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26801"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26801"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26801"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26804"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26804"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26804"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024040404-CVE-2024-26804-a6ff@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26826"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26826"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26826"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26826-b984@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26859"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26859"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26859"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041735-CVE-2024-26859-a906@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26906"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26906"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26906"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041746-CVE-2024-26906-bb35@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26907"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26907"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26907"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024041746-CVE-2024-26907-a02d@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26974"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26974-13eb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-26982"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-26982"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26982"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26982-8675@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27397"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27397"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27397"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27410"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27410"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27410"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051701-CVE-2024-27410-874a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35789"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35789"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35789-52e5@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35835"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35835"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35835"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051730-CVE-2024-35835-d75f@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35838"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35838"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35838"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051731-CVE-2024-35838-d072@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35845"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35845"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35845"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051718-CVE-2024-35845-65bd@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35852"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35852-9e9a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35853"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35853"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35853-869a@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35854"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35854"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35854"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35854-d17b@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35855"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35855"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35855"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35855-c1fb@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35888"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35888"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35888"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051947-CVE-2024-35888-1e04@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35890"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35890"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35890"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35958"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35958"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35958"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35959"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35959"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35959"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35959-6e06@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-35960"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-35960"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35960"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36004"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36004"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36004-fb45@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-36007"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-36007"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36007"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-36007-052e@gregkh/T"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-42159"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301530"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-42159"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42159"},{"type":"ARTICLE","url":"https://lore.kernel.org/linux-cve-announce/2024073036-CVE-2024-42159-c19e@gregkh/T"}],"affected":[{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"bpftool","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"bpftool-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/bpftool-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-ppc64le","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-ppc64le"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-s390x","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-s390x"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-debuginfo-common-x86_64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-debuginfo-common-x86_64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-core","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-modules","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"kernel-zfcpdump-modules-extra","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/kernel-zfcpdump-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"python3-perf","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}},{"package":{"name":"python3-perf-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/python3-perf-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-553.8.1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4211.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H"}]}