{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.188.1","dlm-kmp-rt":"4.12.14-10.188.1","gfs2-kmp-rt":"4.12.14-10.188.1","kernel-devel-rt":"4.12.14-10.188.1","kernel-rt":"4.12.14-10.188.1","kernel-rt-base":"4.12.14-10.188.1","kernel-rt-devel":"4.12.14-10.188.1","kernel-rt_debug":"4.12.14-10.188.1","kernel-rt_debug-devel":"4.12.14-10.188.1","kernel-source-rt":"4.12.14-10.188.1","kernel-syms-rt":"4.12.14-10.188.1","ocfs2-kmp-rt":"4.12.14-10.188.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.188.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.188.1","dlm-kmp-rt":"4.12.14-10.188.1","gfs2-kmp-rt":"4.12.14-10.188.1","kernel-devel-rt":"4.12.14-10.188.1","kernel-rt":"4.12.14-10.188.1","kernel-rt-base":"4.12.14-10.188.1","kernel-rt-devel":"4.12.14-10.188.1","kernel-rt_debug":"4.12.14-10.188.1","kernel-rt_debug-devel":"4.12.14-10.188.1","kernel-source-rt":"4.12.14-10.188.1","kernel-syms-rt":"4.12.14-10.188.1","ocfs2-kmp-rt":"4.12.14-10.188.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.188.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.188.1","dlm-kmp-rt":"4.12.14-10.188.1","gfs2-kmp-rt":"4.12.14-10.188.1","kernel-devel-rt":"4.12.14-10.188.1","kernel-rt":"4.12.14-10.188.1","kernel-rt-base":"4.12.14-10.188.1","kernel-rt-devel":"4.12.14-10.188.1","kernel-rt_debug":"4.12.14-10.188.1","kernel-rt_debug-devel":"4.12.14-10.188.1","kernel-source-rt":"4.12.14-10.188.1","kernel-syms-rt":"4.12.14-10.188.1","ocfs2-kmp-rt":"4.12.14-10.188.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.188.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.188.1","dlm-kmp-rt":"4.12.14-10.188.1","gfs2-kmp-rt":"4.12.14-10.188.1","kernel-devel-rt":"4.12.14-10.188.1","kernel-rt":"4.12.14-10.188.1","kernel-rt-base":"4.12.14-10.188.1","kernel-rt-devel":"4.12.14-10.188.1","kernel-rt_debug":"4.12.14-10.188.1","kernel-rt_debug-devel":"4.12.14-10.188.1","kernel-source-rt":"4.12.14-10.188.1","kernel-syms-rt":"4.12.14-10.188.1","ocfs2-kmp-rt":"4.12.14-10.188.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.188.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948).\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).\n- CVE-2022-48697: Fix a use-after-free (bsc#1223922).\n- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).\n- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).\n- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).\n- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)\n- CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506)\n- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708)\n- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)\n- CVE-2021-47352: Add validation for used length (bsc#1225124).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)\n- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).\n- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2021-47423: Fix file release memory leak (bsc#1225366).\n- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).\n- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).\n- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).\n- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).\n- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).\n- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).\n- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).\n- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).\n- CVE-2021-47401: Fix stack information leak (bsc#1225242).\n- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).\n- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).\n- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)\n- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).\n- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).\n- CVE-2023-52864: Fix opening of char device (bsc#1225132).\n- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).\n- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)\n- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).\n- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).\n- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).\n- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)\n- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)\n- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)\n- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)\n- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).\n- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).\n- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).\n- CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749).\n- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).\n- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).\n- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).\n- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).\n- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).\n- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bzg#1224663)\n- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).\n- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).\n- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).\n- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).\n- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)\n- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error (bsc#1223752).\n- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)\n- CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).\n- CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931).\n- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).\n- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)\n- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).\n- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2024-27008: Fix out of bounds access (bsc#1223802).\n- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n\nThe following non-security bugs were fixed:\n\n- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect.\n- autofs: fix a leak in autofs_expire_indirect() (git-fixes)\n- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).\n- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)\n- btrfs: check if root is readonly while setting security xattr (git-fixes)\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)\n- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)\n- btrfs: do not stop integrity writeback too early (git-fixes)\n- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)\n- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)\n- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)\n- btrfs: fix deadlock when writing out space cache (git-fixes)\n- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)\n- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)\n- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)\n- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)\n- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)\n- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)\n- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)\n- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)\n- btrfs: fix unaligned access in readdir (git-fixes)\n- btrfs: limit device extents to the device size (git-fixes)\n- btrfs: prevent to set invalid default subvolid (git-fixes)\n- btrfs: record delayed inode root in transaction (git-fixes)\n- btrfs: scrub: reject unsupported scrub flags (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: limit number of clones and allocated memory size (git-fixes)\n- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include\n- btrfs: tree-checker: add missing return after error in root_item (git-fixes)\n- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)\n- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)\n- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)\n- btrfs: tree-checker: Fix misleading group system information (git-fixes)\n- btrfs: undo writable superblocke when sprouting fails (git-fixes)\n- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)\n- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)\n- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)\n- ecryptfs: fix kernel panic with null dev_name (git-fixes)\n- ecryptfs: Fix typo in message (git-fixes)\n- ep_create_wakeup_source(): dentry name can change under you (git-fixes)\n- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)\n- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)\n- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)\n- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).\n- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).\n- l2tp: pass correct message length to ip6_append_data (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- list: fix a data-race around ep->rdllist (git-fixes).\n- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).\n- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).\n- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).\n- net: usb: sr9700: stop lying about skb->truesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).\n- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).\n- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).\n- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).\n- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).\n- nfc: change order inside nfc_se_io error path (git-fixes).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- printk: Disable passing console lock owner completely during panic() (bsc#1197894).\n- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).\n- rds: avoid unenecessary cong_update in loop transport (git-fixes).\n- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).\n- rxrpc: Do not put crypto buffers on the stack (git-fixes).\n- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).\n- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).\n- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).\n- rxrpc: Work around usercopy check (git-fixes).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).\n- tcp: tcp_make_synack() can be called from process context (git-fixes).\n- tls: Fix context leak on tls_device_down (bsc#1221545).\n- tracing: Fix blocked reader of snapshot buffer (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).\n- usb: aqc111: stop lying about skb->truesize (git-fixes).\n- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).\n- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).\n","id":"SUSE-SU-2024:1983-1","modified":"2024-06-11T10:56:58Z","published":"2024-06-11T10:56:58Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241983-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181674"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197760"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206213"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218917"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221543"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222559"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222667"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222793"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223023"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223922"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224601"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224648"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224676"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224680"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224844"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224880"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224882"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224917"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224922"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225026"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225059"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225124"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225144"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225390"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225404"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225411"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225438"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225572"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47245"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47248"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47250"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47260"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47276"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47330"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47334"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47344"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47375"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47382"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47383"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47404"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47423"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47424"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47431"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47436"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47456"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47458"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47460"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47469"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47472"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47473"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47478"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47480"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47495"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47496"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47497"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47506"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47509"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47511"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47523"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47541"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47565"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48710"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-42755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-47233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52527"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52586"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52796"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52803"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-0639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26625"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26876"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27054"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27396"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27419"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27436"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36029"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36954"}],"related":["CVE-2021-46933","CVE-2021-46955","CVE-2021-47074","CVE-2021-47113","CVE-2021-47131","CVE-2021-47162","CVE-2021-47171","CVE-2021-47188","CVE-2021-47206","CVE-2021-47220","CVE-2021-47229","CVE-2021-47231","CVE-2021-47235","CVE-2021-47236","CVE-2021-47237","CVE-2021-47238","CVE-2021-47239","CVE-2021-47245","CVE-2021-47246","CVE-2021-47248","CVE-2021-47249","CVE-2021-47250","CVE-2021-47252","CVE-2021-47254","CVE-2021-47258","CVE-2021-47260","CVE-2021-47261","CVE-2021-47265","CVE-2021-47269","CVE-2021-47274","CVE-2021-47276","CVE-2021-47277","CVE-2021-47280","CVE-2021-47281","CVE-2021-47284","CVE-2021-47285","CVE-2021-47288","CVE-2021-47301","CVE-2021-47302","CVE-2021-47305","CVE-2021-47307","CVE-2021-47308","CVE-2021-47310","CVE-2021-47311","CVE-2021-47314","CVE-2021-47315","CVE-2021-47319","CVE-2021-47320","CVE-2021-47321","CVE-2021-47323","CVE-2021-47324","CVE-2021-47330","CVE-2021-47334","CVE-2021-47337","CVE-2021-47343","CVE-2021-47344","CVE-2021-47345","CVE-2021-47347","CVE-2021-47352","CVE-2021-47353","CVE-2021-47355","CVE-2021-47356","CVE-2021-47357","CVE-2021-47361","CVE-2021-47362","CVE-2021-47369","CVE-2021-47375","CVE-2021-47378","CVE-2021-47382","CVE-2021-47383","CVE-2021-47391","CVE-2021-47397","CVE-2021-47400","CVE-2021-47401","CVE-2021-47404","CVE-2021-47409","CVE-2021-47416","CVE-2021-47423","CVE-2021-47424","CVE-2021-47431","CVE-2021-47435","CVE-2021-47436","CVE-2021-47456","CVE-2021-47458","CVE-2021-47460","CVE-2021-47469","CVE-2021-47472","CVE-2021-47473","CVE-2021-47478","CVE-2021-47480","CVE-2021-47483","CVE-2021-47485","CVE-2021-47495","CVE-2021-47496","CVE-2021-47497","CVE-2021-47500","CVE-2021-47506","CVE-2021-47509","CVE-2021-47511","CVE-2021-47523","CVE-2021-47541","CVE-2021-47548","CVE-2021-47565","CVE-2022-48636","CVE-2022-48650","CVE-2022-48672","CVE-2022-48686","CVE-2022-48697","CVE-2022-48702","CVE-2022-48704","CVE-2022-48708","CVE-2022-48710","CVE-2023-0160","CVE-2023-1829","CVE-2023-42755","CVE-2023-47233","CVE-2023-52527","CVE-2023-52586","CVE-2023-52591","CVE-2023-52646","CVE-2023-52653","CVE-2023-52655","CVE-2023-52664","CVE-2023-52685","CVE-2023-52686","CVE-2023-52691","CVE-2023-52696","CVE-2023-52698","CVE-2023-52703","CVE-2023-52730","CVE-2023-52732","CVE-2023-52741","CVE-2023-52742","CVE-2023-52747","CVE-2023-52759","CVE-2023-52774","CVE-2023-52781","CVE-2023-52796","CVE-2023-52803","CVE-2023-52821","CVE-2023-52864","CVE-2023-52865","CVE-2023-52867","CVE-2023-52875","CVE-2023-52880","CVE-2024-0639","CVE-2024-26625","CVE-2024-26739","CVE-2024-26752","CVE-2024-26775","CVE-2024-26791","CVE-2024-26828","CVE-2024-26846","CVE-2024-26874","CVE-2024-26876","CVE-2024-26900","CVE-2024-26915","CVE-2024-26920","CVE-2024-26921","CVE-2024-26929","CVE-2024-26930","CVE-2024-26931","CVE-2024-26934","CVE-2024-26957","CVE-2024-26958","CVE-2024-26984","CVE-2024-26996","CVE-2024-27008","CVE-2024-27054","CVE-2024-27059","CVE-2024-27062","CVE-2024-27388","CVE-2024-27396","CVE-2024-27398","CVE-2024-27401","CVE-2024-27419","CVE-2024-27436","CVE-2024-35789","CVE-2024-35791","CVE-2024-35809","CVE-2024-35811","CVE-2024-35830","CVE-2024-35849","CVE-2024-35877","CVE-2024-35878","CVE-2024-35887","CVE-2024-35895","CVE-2024-35914","CVE-2024-35932","CVE-2024-35935","CVE-2024-35936","CVE-2024-35944","CVE-2024-35955","CVE-2024-35969","CVE-2024-35982","CVE-2024-35984","CVE-2024-36015","CVE-2024-36029","CVE-2024-36954"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-46933","CVE-2021-46955","CVE-2021-47074","CVE-2021-47113","CVE-2021-47131","CVE-2021-47162","CVE-2021-47171","CVE-2021-47188","CVE-2021-47206","CVE-2021-47220","CVE-2021-47229","CVE-2021-47231","CVE-2021-47235","CVE-2021-47236","CVE-2021-47237","CVE-2021-47238","CVE-2021-47239","CVE-2021-47245","CVE-2021-47246","CVE-2021-47248","CVE-2021-47249","CVE-2021-47250","CVE-2021-47252","CVE-2021-47254","CVE-2021-47258","CVE-2021-47260","CVE-2021-47261","CVE-2021-47265","CVE-2021-47269","CVE-2021-47274","CVE-2021-47276","CVE-2021-47277","CVE-2021-47280","CVE-2021-47281","CVE-2021-47284","CVE-2021-47285","CVE-2021-47288","CVE-2021-47301","CVE-2021-47302","CVE-2021-47305","CVE-2021-47307","CVE-2021-47308","CVE-2021-47310","CVE-2021-47311","CVE-2021-47314","CVE-2021-47315","CVE-2021-47319","CVE-2021-47320","CVE-2021-47321","CVE-2021-47323","CVE-2021-47324","CVE-2021-47330","CVE-2021-47334","CVE-2021-47337","CVE-2021-47343","CVE-2021-47344","CVE-2021-47345","CVE-2021-47347","CVE-2021-47352","CVE-2021-47353","CVE-2021-47355","CVE-2021-47356","CVE-2021-47357","CVE-2021-47361","CVE-2021-47362","CVE-2021-47369","CVE-2021-47375","CVE-2021-47378","CVE-2021-47382","CVE-2021-47383","CVE-2021-47391","CVE-2021-47397","CVE-2021-47400","CVE-2021-47401","CVE-2021-47404","CVE-2021-47409","CVE-2021-47416","CVE-2021-47423","CVE-2021-47424","CVE-2021-47431","CVE-2021-47435","CVE-2021-47436","CVE-2021-47456","CVE-2021-47458","CVE-2021-47460","CVE-2021-47469","CVE-2021-47472","CVE-2021-47473","CVE-2021-47478","CVE-2021-47480","CVE-2021-47483","CVE-2021-47485","CVE-2021-47495","CVE-2021-47496","CVE-2021-47497","CVE-2021-47500","CVE-2021-47506","CVE-2021-47509","CVE-2021-47511","CVE-2021-47523","CVE-2021-47541","CVE-2021-47548","CVE-2021-47565","CVE-2022-48636","CVE-2022-48650","CVE-2022-48672","CVE-2022-48686","CVE-2022-48697","CVE-2022-48702","CVE-2022-48704","CVE-2022-48708","CVE-2022-48710","CVE-2023-0160","CVE-2023-1829","CVE-2023-42755","CVE-2023-47233","CVE-2023-52527","CVE-2023-52586","CVE-2023-52591","CVE-2023-52646","CVE-2023-52653","CVE-2023-52655","CVE-2023-52664","CVE-2023-52685","CVE-2023-52686","CVE-2023-52691","CVE-2023-52696","CVE-2023-52698","CVE-2023-52703","CVE-2023-52730","CVE-2023-52732","CVE-2023-52741","CVE-2023-52742","CVE-2023-52747","CVE-2023-52759","CVE-2023-52774","CVE-2023-52781","CVE-2023-52796","CVE-2023-52803","CVE-2023-52821","CVE-2023-52864","CVE-2023-52865","CVE-2023-52867","CVE-2023-52875","CVE-2023-52880","CVE-2024-0639","CVE-2024-26625","CVE-2024-26739","CVE-2024-26752","CVE-2024-26775","CVE-2024-26791","CVE-2024-26828","CVE-2024-26846","CVE-2024-26874","CVE-2024-26876","CVE-2024-26900","CVE-2024-26915","CVE-2024-26920","CVE-2024-26921","CVE-2024-26929","CVE-2024-26930","CVE-2024-26931","CVE-2024-26934","CVE-2024-26957","CVE-2024-26958","CVE-2024-26984","CVE-2024-26996","CVE-2024-27008","CVE-2024-27054","CVE-2024-27059","CVE-2024-27062","CVE-2024-27388","CVE-2024-27396","CVE-2024-27398","CVE-2024-27401","CVE-2024-27419","CVE-2024-27436","CVE-2024-35789","CVE-2024-35791","CVE-2024-35809","CVE-2024-35811","CVE-2024-35830","CVE-2024-35849","CVE-2024-35877","CVE-2024-35878","CVE-2024-35887","CVE-2024-35895","CVE-2024-35914","CVE-2024-35932","CVE-2024-35935","CVE-2024-35936","CVE-2024-35944","CVE-2024-35955","CVE-2024-35969","CVE-2024-35982","CVE-2024-35984","CVE-2024-36015","CVE-2024-36029","CVE-2024-36954"]}