{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1.150500.6.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1.150500.6.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1.150500.6.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-64kb":"5.14.21-150500.55.91.1","kernel-64kb-devel":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","kernel-zfcpdump":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"kernel-zfcpdump","purl":"pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1.150500.6.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.91.1","dlm-kmp-default":"5.14.21-150500.55.91.1","gfs2-kmp-default":"5.14.21-150500.55.91.1","kernel-default":"5.14.21-150500.55.91.1","kernel-default-base":"5.14.21-150500.55.91.1.150500.6.41.1","kernel-default-devel":"5.14.21-150500.55.91.1","kernel-devel":"5.14.21-150500.55.91.1","kernel-docs":"5.14.21-150500.55.91.1","kernel-macros":"5.14.21-150500.55.91.1","kernel-obs-build":"5.14.21-150500.55.91.1","kernel-source":"5.14.21-150500.55.91.1","kernel-syms":"5.14.21-150500.55.91.1","ocfs2-kmp-default":"5.14.21-150500.55.91.1","reiserfs-kmp-default":"5.14.21-150500.55.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.91.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).\n- CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694).\n- CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045).\n- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).\n- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).\n- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).\n- CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823).\n- CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).\n- CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).\n- CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait for it (bsc#1231453).\n- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).\n- CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).\n- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).\n- CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).\n- CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).\n- CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).\n- CVE-2024-50181: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (bsc#1233127).\n- CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).\n- CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).\n- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).\n- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).\n- CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).\n- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).\n- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).\n- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).\n- CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547).\n- CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550).\n- CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568).\n- CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464).\n- CVE-2024-53072: platform/x86/amd/pmc: Detect when STB is not available (bsc#1233564).\n- CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).\n- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).\n- CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid (bsc#1233769).\n- CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).\n- CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).\n- CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).\n- CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).\n- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).\n- CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).\n- CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).\n- CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (bsc#1234834).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).\n- CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (bsc#1234827).\n- CVE-2024-53158: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (bsc#1234811).\n- CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).\n- CVE-2024-53162: crypto: qat/qat_4xxx - fix off by one in uof_get_name() (bsc#1234843).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).\n- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).\n- CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (bsc#1234971).\n- CVE-2024-53213: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (bsc#1234973).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).\n- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).\n- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).\n- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).\n- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).\n- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).\n- CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912).\n- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).\n- CVE-2024-56571: media: uvcvideo: Require entities to have a non-zero unique ID (bsc#1235037).\n- CVE-2024-56575: media: imx-jpeg: Ensure power suppliers be suspended before detach them (bsc#1235039).\n- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).\n- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).\n- CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).\n\nThe following non-security bugs were fixed:\n\n- ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)\n- Documentation: Add x86/amd_hsmp driver (jsc#PED-1295).\n- Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-fixes).\n- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139)\n- KVM: x86: fix sending PV IPI (git-fixes).\n- NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-fixes).\n- NFSD: Fix nfsd4_shutdown_copy() (git-fixes).\n- NFSD: Move fill_pre_wcc() and fill_post_wcc() (bsc#1234650 bsc#1233701 bsc#1232472).\n- NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).\n- NFSD: Prevent a potential integer overflow (git-fixes).\n- NFSD: reduce locking in nfsd_lookup() (bsc#1234650 bsc#1233701 bsc#1232472).\n- NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-fixes).\n- PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes).\n- RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-fixes)\n- README: Clean-up trailing whitespace\n- SUNRPC: make sure cache entry active before cache_show (git-fixes).\n- amd_hsmp: Add HSMP protocol version 5 messages (jsc#PED-1295).\n- arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605)\n- arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-fixes).\n- arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes).\n- arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes).\n- arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-sapphire-excavator (git-fixes).\n- arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma lion (git-fixes).\n- arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes).\n- autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).\n- autofs: use flexible array in ioctl structure (git-fixes).\n- devlink: allow registering parameters after the instance (bsc#1231388 bsc#1230422).\n- devlink: do not require setting features before registration (bsc#1231388 bsc#1230422).\n- dma-fence: Fix reference leak on fence merge failure path (git-fixes).\n- dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357).\n- dmaengine: idxd: add wq driver name support for accel-config user tool (bsc#1234357).\n- drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).\n- drm/v3d: Enable Performance Counters before clearing them (git-fixes).\n- exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).\n- fixup 'rpm: support gz and zst compression methods' once more (bsc#1190428, bsc#1190358) Fixes: 3b8c4d9bcc24 ('rpm: support gz and zst compression methods') Fixes: 23510fce36ec ('fixup 'rpm: support gz and zst compression methods'')\n- hfsplus: do not query the device logical block size multiple times (git-fixes).\n- idpf: add support for SW triggered interrupts (bsc#1235507).\n- idpf: enable WB_ON_ITR (bsc#1235507).\n- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).\n- ipc/sem: Fix dangling sem_array access in semtimedop race (bsc#1234727).\n- jffs2: Fix rtime decompressor (git-fixes).\n- jffs2: Prevent rtime decompress memory corruption (git-fixes).\n- jffs2: fix use of uninitialized variable (git-fixes).\n- jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-fixes).\n- jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).\n- jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).\n- jfs: fix shift-out-of-bounds in dbSplit (git-fixes).\n- jfs: xattr: check invalid xattr size more strictly (git-fixes).\n- kabi/severities: ignore intermodule symbols between fsl_fman and fsl_dpaa_eth\n- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.\n- kobject: Add sanity check for kset->kobj.ktype in kset_register() (bsc#1234639).\n- memory: tegra: Add API for retrieving carveout bounds (jsc#PED-1763).\n- mm/kfence: reset PG_slab and memcg_data before freeing __kfence_pool (bsc#1234120).\n- mmc: core: Further prevent card detect during shutdown (git-fixes).\n- net/ipv6: release expired exception dst cached in socket (bsc#1216813).\n- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).\n- nfsd: make sure exp active before svc_export_show (git-fixes).\n- nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234650 bsc#1233701 bsc#1232472).\n- nfsd: restore callback functionality for NFSv4.0 (git-fixes).\n- nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes).\n- nilfs2: prevent use of deleted inode (git-fixes).\n- ocfs2: uncache inode which has failed entering the group (bsc#1234087).\n- phy: tegra: p2u: Set ENABLE_L2_EXIT_RATE_CHANGE in calibration (jsc#PED-1763).\n- platform/x86: Add AMD system management interface (jsc#PED-1295).\n- proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-fixes).\n- pwm: tegra: Improve required rate calculation (jsc#PED-1763).\n- regmap: detach regmap from dev on regmap_exit (git-fixes).\n- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression\n- scatterlist: fix incorrect func name in kernel-doc (git-fixes).\n- scripts/git_sort/git_sort.py: add tegra DRM and linux-pwm repo\n- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).\n- serial: tegra: Read DMA status before terminating (jsc#PED-1763).\n- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].\n- spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).\n- sunrpc: simplify two-level sysctl registration for svcrdma_parm_table (git-fixes).\n- supported.conf: add bsc1185010 dependency\n- supported.conf: hyperv_drm (jsc#sle-19733)\n- svcrdma: Address an integer overflow (git-fixes).\n- svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-fixes).\n- tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)\n- ubifs: Correct the total block count by deducting journal reservation (git-fixes).\n- ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-fixes).\n- udf: Handle error when adding extent to a file (bsc#1234437).\n- udf: refactor udf_current_aext() to handle error (bsc#1234240).\n- udf: refactor udf_next_aext() to handle error (bsc#1234241).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).\n- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).\n- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).\n- x86/fpu: Remove unused supervisor only offsets (git-fixes).\n- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).\n- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).\n- x86/mce: Allow instrumentation during task work queueing (git-fixes).\n- x86/mce: Mark mce_end() noinstr (git-fixes).\n- x86/mce: Mark mce_panic() noinstr (git-fixes).\n- x86/mce: Mark mce_read_aux() noinstr (git-fixes).\n- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).\n- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).\n- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).\n- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).\n- x86/uaccess: Move variable into switch case statement (git-fixes).\n- x86: Annotate call_on_stack() (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- zonefs: fix zone report size in __zonefs_io_error() (git-fixes).\n","id":"SUSE-SU-2025:0201-2","modified":"2025-03-11T13:41:34Z","published":"2025-03-11T13:41:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250201-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1170891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205521"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209288"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211595"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226694"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230697"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231388"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232472"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233239"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233324"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233642"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234219"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234240"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234281"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234294"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234338"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234971"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235004"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-36280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1382"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-33951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-33952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-24860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47666"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50256"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50262"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53241"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56570"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56571"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8805"}],"related":["CVE-2021-47202","CVE-2022-36280","CVE-2022-48742","CVE-2022-49033","CVE-2022-49035","CVE-2023-1382","CVE-2023-33951","CVE-2023-33952","CVE-2023-52920","CVE-2024-24860","CVE-2024-26886","CVE-2024-26924","CVE-2024-36915","CVE-2024-42232","CVE-2024-44934","CVE-2024-47666","CVE-2024-47678","CVE-2024-49944","CVE-2024-49952","CVE-2024-50018","CVE-2024-50143","CVE-2024-50154","CVE-2024-50166","CVE-2024-50181","CVE-2024-50202","CVE-2024-50211","CVE-2024-50256","CVE-2024-50262","CVE-2024-50278","CVE-2024-50279","CVE-2024-50280","CVE-2024-50296","CVE-2024-53051","CVE-2024-53055","CVE-2024-53056","CVE-2024-53064","CVE-2024-53072","CVE-2024-53090","CVE-2024-53095","CVE-2024-53101","CVE-2024-53113","CVE-2024-53114","CVE-2024-53119","CVE-2024-53120","CVE-2024-53122","CVE-2024-53125","CVE-2024-53130","CVE-2024-53131","CVE-2024-53142","CVE-2024-53146","CVE-2024-53150","CVE-2024-53156","CVE-2024-53157","CVE-2024-53158","CVE-2024-53161","CVE-2024-53162","CVE-2024-53173","CVE-2024-53179","CVE-2024-53206","CVE-2024-53210","CVE-2024-53213","CVE-2024-53214","CVE-2024-53239","CVE-2024-53240","CVE-2024-53241","CVE-2024-56539","CVE-2024-56548","CVE-2024-56549","CVE-2024-56570","CVE-2024-56571","CVE-2024-56575","CVE-2024-56598","CVE-2024-56604","CVE-2024-56605","CVE-2024-56619","CVE-2024-56755","CVE-2024-8805"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47202","CVE-2022-36280","CVE-2022-48742","CVE-2022-49033","CVE-2022-49035","CVE-2023-1382","CVE-2023-33951","CVE-2023-33952","CVE-2023-52920","CVE-2024-24860","CVE-2024-26886","CVE-2024-26924","CVE-2024-36915","CVE-2024-42232","CVE-2024-44934","CVE-2024-47666","CVE-2024-47678","CVE-2024-49944","CVE-2024-49952","CVE-2024-50018","CVE-2024-50143","CVE-2024-50154","CVE-2024-50166","CVE-2024-50181","CVE-2024-50202","CVE-2024-50211","CVE-2024-50256","CVE-2024-50262","CVE-2024-50278","CVE-2024-50279","CVE-2024-50280","CVE-2024-50296","CVE-2024-53051","CVE-2024-53055","CVE-2024-53056","CVE-2024-53064","CVE-2024-53072","CVE-2024-53090","CVE-2024-53095","CVE-2024-53101","CVE-2024-53113","CVE-2024-53114","CVE-2024-53119","CVE-2024-53120","CVE-2024-53122","CVE-2024-53125","CVE-2024-53130","CVE-2024-53131","CVE-2024-53142","CVE-2024-53146","CVE-2024-53150","CVE-2024-53156","CVE-2024-53157","CVE-2024-53158","CVE-2024-53161","CVE-2024-53162","CVE-2024-53173","CVE-2024-53179","CVE-2024-53206","CVE-2024-53210","CVE-2024-53213","CVE-2024-53214","CVE-2024-53239","CVE-2024-53240","CVE-2024-53241","CVE-2024-56539","CVE-2024-56548","CVE-2024-56549","CVE-2024-56570","CVE-2024-56571","CVE-2024-56575","CVE-2024-56598","CVE-2024-56604","CVE-2024-56605","CVE-2024-56619","CVE-2024-56755","CVE-2024-8805"]}