{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.200.1","kernel-azure-base":"4.12.14-16.200.1","kernel-azure-devel":"4.12.14-16.200.1","kernel-devel-azure":"4.12.14-16.200.1","kernel-source-azure":"4.12.14-16.200.1","kernel-syms-azure":"4.12.14-16.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.200.1","kernel-azure-base":"4.12.14-16.200.1","kernel-azure-devel":"4.12.14-16.200.1","kernel-devel-azure":"4.12.14-16.200.1","kernel-source-azure":"4.12.14-16.200.1","kernel-syms-azure":"4.12.14-16.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.200.1","kernel-azure-base":"4.12.14-16.200.1","kernel-azure-devel":"4.12.14-16.200.1","kernel-devel-azure":"4.12.14-16.200.1","kernel-source-azure":"4.12.14-16.200.1","kernel-syms-azure":"4.12.14-16.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.200.1","kernel-azure-base":"4.12.14-16.200.1","kernel-azure-devel":"4.12.14-16.200.1","kernel-devel-azure":"4.12.14-16.200.1","kernel-source-azure":"4.12.14-16.200.1","kernel-syms-azure":"4.12.14-16.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.200.1","kernel-azure-base":"4.12.14-16.200.1","kernel-azure-devel":"4.12.14-16.200.1","kernel-devel-azure":"4.12.14-16.200.1","kernel-source-azure":"4.12.14-16.200.1","kernel-syms-azure":"4.12.14-16.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.200.1","kernel-azure-base":"4.12.14-16.200.1","kernel-azure-devel":"4.12.14-16.200.1","kernel-devel-azure":"4.12.14-16.200.1","kernel-source-azure":"4.12.14-16.200.1","kernel-syms-azure":"4.12.14-16.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.200.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory (bsc#1225316).\n- CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport error_recovery work (bsc#1227952).\n- CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport error_recovery work (bsc#1228000).\n- CVE-2022-48790: nvme: fix a possible use-after-free in controller reset during load (bsc#1227941).\n- CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)\n- CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch() (bsc#1227953).\n- CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068).\n- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).\n- CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug (bsc#1229645).\n- CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398).\n- CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270).\n- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).\n- CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635).\n- CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615).\n- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620 CVE-2024-41082).\n- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).\n- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).\n- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).\n- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).\n- CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)\n- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).\n- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).\n- CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830)\n- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).\n- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).\n- CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them (bsc#1230174).\n- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).\n- CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race  (bsc#1230178).\n- CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176).\n- CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200).\n- CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (bsc#1230204).\n- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).\n- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).\n- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).\n- CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).\n- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).\n- CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer address access (bsc#1230533).\n- CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535).\n- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).\n- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).\n- CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515)\n- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).\n- CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589)\n- CVE-2024-46707: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3  (bsc#1230582).\n- CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access  (bsc#1230700).\n- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)\n- CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning (bsc#1230712).\n- CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning (bsc#1230702).\n- CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning (bsc#1230709).\n- CVE-2024-46738: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (bsc#1230731).\n- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).\n- CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747).\n- CVE-2024-46745: Input: uinput - reject requests with unreasonable number of slots (bsc#1230748).\n- CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783).\n- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).\n- CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit attributes (bsc#1230814).\n- CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (bsc#1230761).\n- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).\n- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).\n- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).\n- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).\n- CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug (bsc#1231083).\n- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).\n- CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (bsc#1231089).\n\nThe following non-security bugs were fixed:\n\n- ACPI / EC: Clean up EC GPE mask flag (git-fixes).\n- ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes).\n- ACPI: EC: Fix an EC event IRQ storming issue (git-fixes).\n- ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes).\n- ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes).\n- ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git-fixes).\n- ACPI: SPCR: work around clock issue on xgene UART (git-fixes).\n- ACPI: blacklist: fix clang warning for unused DMI table (git-fixes).\n- ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35 (git-fixes).\n- Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).\n- Fix bsc#1054914 reference.\n- PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).\n- RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)\n- RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)\n- RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-fixes)\n- Revert 'ACPI / EC: Remove old CLEAR_ON_RESUME quirk' (git-fixes).\n- af_unix: Fix data races around sk->sk_shutdown (bsc#1226846).\n- af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846).\n- autofs4: use wait_event_killable (bsc#1207341).\n- ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231184).\n- fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230151).\n- kabi fix for proc/mounts: add cursor (bsc#1207341).\n- kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848) These are lowlevel functions not used outside of exception handling and kernel debugging facilities.\n- kthread: Fix task state in kthread worker if being frozen (bsc#1231146).\n- media: vivid: avoid integer overflow (git-fixes).\n- media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes).\n- media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes).\n- media: vivid: s_fbuf: add more sanity checks (git-fixes).\n- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-fixes).\n- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).\n- net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).\n- nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).\n- nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes).\n- ocfs2: fix null-ptr-deref when journal load failed (git-fixes).\n- ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).\n- ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).\n- powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826 ltc#205848).\n- powerpc sstep: Add support for extswsli instruction (bsc#1230826 ltc#205848).\n- powerpc sstep: Add support for modsd, modud instructions (bsc#1230826 ltc#205848).\n- powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826 ltc#205848).\n- powerpc/32: Move the inline keyword at the beginning of function declaration (bsc#1230826 ltc#205848).\n- powerpc/64: Fix update forms of loads and stores to write 64-bit EA (bsc#1230826 ltc#205848).\n- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848).\n- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).\n- powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729).\n- powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729).\n- powerpc/kprobes: Blacklist emulate_update_regs() from kprobes (bsc#1230826 ltc#205848).\n- powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32 (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32 (bsc#1230826 ltc#205848).\n- powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848).\n- powerpc/lib: Fix 'integer constant is too large' build failure (bsc#1230826 ltc#205848).\n- powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848).\n- powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848).\n- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1065729).\n- powerpc/sstep: Add support for divde[.] and divdeu[.] instructions (bsc#1230826 ltc#205848).\n- powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1230826 ltc#205848).\n- powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826 ltc#205848).\n- powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848).\n- powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848).\n- powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826 ltc#205848).\n- powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848).\n- powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826 ltc#205848).\n- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).\n- powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848).\n- powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826 ltc#205848).\n- powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr() (bsc#1230826 ltc#205848).\n- powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions (bsc#1230826 ltc#205848).\n- powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live (bsc#1230826 ltc#205848).\n- powerpc: Emulate load/store floating double pair instructions (bsc#1230826 ltc#205848).\n- powerpc: Emulate load/store floating point as integer word instructions (bsc#1230826 ltc#205848).\n- powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848).\n- powerpc: Emulate vector element load/store instructions (bsc#1230826 ltc#205848).\n- powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848).\n- powerpc: Fix handling of alignment interrupt on dcbz instruction (bsc#1230826 ltc#205848).\n- powerpc: Fix kernel crash in emulation of vector loads and stores (bsc#1230826 ltc#205848).\n- powerpc: Handle most loads and stores in instruction emulation code (bsc#1230826 ltc#205848).\n- powerpc: Handle opposite-endian processes in emulation code (bsc#1230826 ltc#205848).\n- powerpc: Make load/store emulation use larger memory accesses (bsc#1230826 ltc#205848).\n- powerpc: Remove support for PowerPC 601 (Remove unused and malformed assembly causing build error).\n- powerpc: Separate out load/store emulation into its own function (bsc#1230826 ltc#205848).\n- powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826 ltc#205848).\n- powerpc: Use instruction emulation infrastructure to handle alignment faults (bsc#1230826 ltc#205848).\n- powerpc: Wrap register number correctly for string load/store instructions (bsc#1230826 ltc#205848).\n- powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848).\n- powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions (bsc#1230826 ltc#205848).\n- proc/mounts: add cursor (bsc#1207341).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).\n- uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-fixes).\n- usbnet: fix cyclical race on disconnect with work queue (git-fixes).\n- usbnet: modern method to get random MAC (git-fixes).\n","id":"SUSE-SU-2024:3591-1","modified":"2024-10-10T15:34:34Z","published":"2024-10-10T15:34:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243591-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229362"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229363"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229753"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230204"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230515"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230517"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230556"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230589"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230826"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47387"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48799"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48844"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38381"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42306"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46721"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46731"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46859"}],"related":["CVE-2021-47387","CVE-2022-48788","CVE-2022-48789","CVE-2022-48790","CVE-2022-48791","CVE-2022-48799","CVE-2022-48844","CVE-2022-48911","CVE-2022-48943","CVE-2022-48945","CVE-2023-52915","CVE-2024-38381","CVE-2024-38596","CVE-2024-38632","CVE-2024-41073","CVE-2024-41079","CVE-2024-41082","CVE-2024-42154","CVE-2024-42265","CVE-2024-42305","CVE-2024-42306","CVE-2024-43884","CVE-2024-43890","CVE-2024-43898","CVE-2024-43912","CVE-2024-43914","CVE-2024-44946","CVE-2024-44947","CVE-2024-44948","CVE-2024-44950","CVE-2024-44952","CVE-2024-44954","CVE-2024-44969","CVE-2024-44982","CVE-2024-44987","CVE-2024-44998","CVE-2024-44999","CVE-2024-45008","CVE-2024-46673","CVE-2024-46675","CVE-2024-46676","CVE-2024-46677","CVE-2024-46679","CVE-2024-46685","CVE-2024-46686","CVE-2024-46702","CVE-2024-46707","CVE-2024-46715","CVE-2024-46721","CVE-2024-46722","CVE-2024-46723","CVE-2024-46731","CVE-2024-46737","CVE-2024-46738","CVE-2024-46739","CVE-2024-46743","CVE-2024-46744","CVE-2024-46745","CVE-2024-46750","CVE-2024-46753","CVE-2024-46759","CVE-2024-46761","CVE-2024-46770","CVE-2024-46774","CVE-2024-46783","CVE-2024-46784","CVE-2024-46787","CVE-2024-46822","CVE-2024-46853","CVE-2024-46854","CVE-2024-46859"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47387","CVE-2022-48788","CVE-2022-48789","CVE-2022-48790","CVE-2022-48791","CVE-2022-48799","CVE-2022-48844","CVE-2022-48911","CVE-2022-48943","CVE-2022-48945","CVE-2023-52915","CVE-2024-38381","CVE-2024-38596","CVE-2024-38632","CVE-2024-41073","CVE-2024-41079","CVE-2024-41082","CVE-2024-42154","CVE-2024-42265","CVE-2024-42305","CVE-2024-42306","CVE-2024-43884","CVE-2024-43890","CVE-2024-43898","CVE-2024-43912","CVE-2024-43914","CVE-2024-44946","CVE-2024-44947","CVE-2024-44948","CVE-2024-44950","CVE-2024-44952","CVE-2024-44954","CVE-2024-44969","CVE-2024-44982","CVE-2024-44987","CVE-2024-44998","CVE-2024-44999","CVE-2024-45008","CVE-2024-46673","CVE-2024-46675","CVE-2024-46676","CVE-2024-46677","CVE-2024-46679","CVE-2024-46685","CVE-2024-46686","CVE-2024-46702","CVE-2024-46707","CVE-2024-46715","CVE-2024-46721","CVE-2024-46722","CVE-2024-46723","CVE-2024-46731","CVE-2024-46737","CVE-2024-46738","CVE-2024-46739","CVE-2024-46743","CVE-2024-46744","CVE-2024-46745","CVE-2024-46750","CVE-2024-46753","CVE-2024-46759","CVE-2024-46761","CVE-2024-46770","CVE-2024-46774","CVE-2024-46783","CVE-2024-46784","CVE-2024-46787","CVE-2024-46822","CVE-2024-46853","CVE-2024-46854","CVE-2024-46859"]}