{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_14_21-150500_13_67-rt":"1-150500.11.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP5","name":"kernel-livepatch-SLE15-SP5-RT_Update_19","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP5-RT_Update_19&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150500.11.3.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","ocfs2-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","ocfs2-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","ocfs2-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","ocfs2-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"openSUSE:Leap Micro 5.5","name":"kernel-rt","purl":"pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-extra":"5.14.21-150500.13.67.3","kernel-rt-livepatch":"5.14.21-150500.13.67.3","kernel-rt-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt-optional":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","kselftests-kmp-rt":"5.14.21-150500.13.67.3","ocfs2-kmp-rt":"5.14.21-150500.13.67.3","reiserfs-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-rt","purl":"pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-extra":"5.14.21-150500.13.67.3","kernel-rt-livepatch":"5.14.21-150500.13.67.3","kernel-rt-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt-optional":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","kselftests-kmp-rt":"5.14.21-150500.13.67.3","ocfs2-kmp-rt":"5.14.21-150500.13.67.3","reiserfs-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-rt_debug","purl":"pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-extra":"5.14.21-150500.13.67.3","kernel-rt-livepatch":"5.14.21-150500.13.67.3","kernel-rt-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt-optional":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","kselftests-kmp-rt":"5.14.21-150500.13.67.3","ocfs2-kmp-rt":"5.14.21-150500.13.67.3","reiserfs-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-source-rt","purl":"pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.67.3","dlm-kmp-rt":"5.14.21-150500.13.67.3","gfs2-kmp-rt":"5.14.21-150500.13.67.3","kernel-devel-rt":"5.14.21-150500.13.67.3","kernel-rt":"5.14.21-150500.13.67.3","kernel-rt-devel":"5.14.21-150500.13.67.3","kernel-rt-extra":"5.14.21-150500.13.67.3","kernel-rt-livepatch":"5.14.21-150500.13.67.3","kernel-rt-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt-optional":"5.14.21-150500.13.67.3","kernel-rt-vdso":"5.14.21-150500.13.67.3","kernel-rt_debug":"5.14.21-150500.13.67.3","kernel-rt_debug-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.67.3","kernel-rt_debug-vdso":"5.14.21-150500.13.67.3","kernel-source-rt":"5.14.21-150500.13.67.3","kernel-syms-rt":"5.14.21-150500.13.67.1","kselftests-kmp-rt":"5.14.21-150500.13.67.3","ocfs2-kmp-rt":"5.14.21-150500.13.67.3","reiserfs-kmp-rt":"5.14.21-150500.13.67.3"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-syms-rt","purl":"pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.67.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).\n- CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).\n- CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).\n- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).\n- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).\n- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).\n- CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).\n- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).\n- CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).\n- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).\n- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).\n- CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).\n- CVE-2024-41087: Fix double free on error (bsc#1228466).\n- CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).\n- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).\n- CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768)\n- CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).\n- CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)\n- CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).\n- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).\n- CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527).\n- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)\n- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).\n- CVE-2024-26812: struct virqfd kABI workaround (bsc#1222808).\n- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)\n- CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).\n- CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605)\n- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).\n- CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722).\n- CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569).\n- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).\n- CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).\n- CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)\n- CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)\n- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)\n- CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962)\n- CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428).\n- CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)\n- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).\n- CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).\n- CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510).\n- CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415).\n- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).\n- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290).\n- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).\n- CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).\n- CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).\n- CVE-2024-27016: Validate pppoe header (bsc#1223807).\n- CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).\n- CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877).\n- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).\n- CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297).\n- CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).\n- CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).\n- CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314)\n- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)\n- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)\n- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).\n- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number') (bsc#1222387)\n- CVE-2024-36009: Blacklist 467324bcfe1a ('ax25: Fix netdev refcount issue') (bsc#1224542)\n- CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).\n- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)\n- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)\n- CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)\n- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)\n- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)\n- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)\n- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).\n- CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351).\n- CVE-2024-26669: Fix chain template offload (bsc#1222350).\n- CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287).\n- CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508).\n- CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).\n- CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).\n- CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).\n- CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350).\n- CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319).\n- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).\n- CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).\n- CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).\n- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).\n- CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).\n- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).\n- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)\n- CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).\n- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).\n- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)\n- CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372).\n- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).\n- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).\n- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).\n- CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).\n- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).\n- CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269).\n- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).\n- CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958).\n- CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).\n- CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).\n- CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).\n- CVE-2024-42139: Fix improper extts handling (bsc#1228503).\n- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).\n- CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).\n- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).\n- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).\n- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).\n- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).\n- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).\n- CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).\n- CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (bsc#1226613).\n- CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).\n- CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).\n- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).\n- CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).\n\nThe following non-security bugs were fixed:\n\n- ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).\n- ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-fixes).\n- ACPI: bus: Rework system-level device notification handling (git-fixes).\n- ACPI: thermal: Drop nocrt parameter (git-fixes).\n- ACPI: x86: s2idle: Post-increment variables when getting constraints (git-fixes).\n- afs: Do not cross .backup mountpoint from backup volume (git-fixes).\n- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).\n- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).\n- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).\n- ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).\n- ALSA: line6: Fix racy access to midibuf (stable-fixes).\n- ALSA: timer: Relax start tick time check for slave timer elements (git-fixes).\n- ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).\n- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).\n- ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).\n- ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).\n- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)\n- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)\n- arm64: Add Neoverse-V2 part (git-fixes)\n- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)\n- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)\n- arm64: barrier: Restore spec_bar() macro (git-fixes)\n- arm64: cpufeature: Add missing .field_width for GIC system registers (git-fixes)\n- arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)\n- arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-fixes)\n- arm64: cputype: Add Cortex-A720 definitions (git-fixes)\n- arm64: cputype: Add Cortex-A725 definitions (git-fixes)\n- arm64: cputype: Add Cortex-X1C definitions (git-fixes)\n- arm64: cputype: Add Cortex-X3 definitions (git-fixes)\n- arm64: cputype: Add Cortex-X4 definitions (git-fixes)\n- arm64: cputype: Add Cortex-X925 definitions (git-fixes)\n- arm64: cputype: Add Neoverse-V3 definitions (git-fixes)\n- arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)\n- arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)\n- arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)\n- arm64: errata: Expand speculative SSBS workaround (git-fixes)\n- arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update default configuration.\n- arm64: Fix KASAN random tag seed initialization (git-fixes)\n- arm64: Fix KASAN random tag seed initialization (git-fixes)\n- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).\n- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).\n- async: Introduce async_schedule_dev_nocall() (bsc#1221269).\n- async: Split async_schedule_node_domain() (bsc#1221269).\n- Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).\n- Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).\n- Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-fixes).\n- Bluetooth: L2CAP: Fix deadlock (git-fixes).\n- bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).\n- bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).\n- btrfs: fix leak of qgroup extent records after transaction abort (git-fixes).\n- btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).\n- btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).\n- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).\n- cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418).\n- ceph: issue a cap release immediately if no cap exists (bsc#1225162).\n- ceph: periodically flush the cap releases (bsc#1225162).\n- cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).\n- cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).\n- docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).\n- drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).\n- drm: panel-orientation-quirks: Add labels for both Valve Steam Deck revisions (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).\n- drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values can be stored (stable-fixes).\n- drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes).\n- drm/amd/display: avoid using null object of framebuffer (git-fixes).\n- drm/amd/display: Fix && vs || typos (git-fixes).\n- drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-fixes).\n- drm/amd/display: Validate hw_points_num before using it (stable-fixes).\n- drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-fixes).\n- drm/amdgpu: Actually check flags for all context ops (stable-fixes).\n- drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).\n- drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).\n- drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).\n- drm/amdgpu: Validate TA binary size (stable-fixes).\n- drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).\n- drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).\n- drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).\n- drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).\n- drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes).\n- drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).\n- drm/client: fix null pointer dereference in drm_client_modeset_probe (git-fixes).\n- drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).\n- drm/lima: set gp bus_stop bit before hard reset (stable-fixes).\n- drm/msm/dp: reset the link phy params before link training (git-fixes).\n- drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).\n- drm/msm/dpu: do not play tricks with debug macros (git-fixes).\n- drm/tegra: Zero-initialize iosys_map (stable-fixes).\n- exfat: fix inode->i_blocks for non-512 byte sector size device (git-fixes).\n- exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).\n- exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).\n- exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).\n- fs/netfs/fscache_cookie: add missing 'n_accesses' check (bsc#1229453).\n- fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).\n- genirq: Add might_sleep() to disable_irq() (git-fixes).\n- genirq: Always limit the affinity to online CPUs (git-fixes).\n- genirq: Do not return error on missing optional irq_request_resources() (git-fixes).\n- genirq: Take the proposed affinity at face value if force==true (git-fixes).\n- genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-fixes).\n- genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).\n- genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes).\n- genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).\n- genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-fixes).\n- genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-fixes).\n- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).\n- hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).\n- i2c: smbus: Improve handling of stuck alerts (git-fixes).\n- i2c: smbus: Send alert notifications to all devices if source not found (git-fixes).\n- iommu/amd: Convert comma to semicolon (git-fixes).\n- ip6_tunnel: Fix broken GRO (bsc#1229444).\n- ipv6: sr: fix incorrect unregister order (git-fixes).\n- irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).\n- irqdomain: Fix association race (git-fixes).\n- irqdomain: Fix disassociation race (git-fixes).\n- irqdomain: Fix domain registration race (git-fixes).\n- irqdomain: Fix mapping-creation race (git-fixes).\n- irqdomain: Fixed unbalanced fwnode get and put (git-fixes).\n- irqdomain: Look for existing mapping only once (git-fixes).\n- irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).\n- irqdomain: Report irq number for NOMAP domains (git-fixes).\n- kprobes: Fix to check symbol prefixes correctly (git-fixes).\n- lockd: move from strlcpy with unused retval to strscpy (git-fixes).\n- memcg: protect concurrent access to mem_cgroup_idr (git-fixes).\n- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).\n- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).\n- mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).\n- mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).\n- net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-fixes).\n- net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).\n- net: ks8851: Fix potential TX stall after interface reopen (git-fixes).\n- net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).\n- net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).\n- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).\n- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).\n- net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).\n- net: remove two BUG() from skb_checksum_help() (bsc#1229312).\n- net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).\n- net/rds: fix possible cp null dereference (git-fixes).\n- net/sched: initialize noop_qdisc owner (git-fixes).\n- nfc: pn533: Add poll mod list filling check (git-fixes).\n- nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).\n- nfs: make the rpc_stat per net namespace (git-fixes).\n- NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).\n- NFSD: add security label to struct nfsd_attrs (git-fixes).\n- NFSD: fix regression with setting ACLs (git-fixes).\n- NFSD: Fix strncpy() fortify warning (git-fixes).\n- NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).\n- NFSD: introduce struct nfsd_attrs (git-fixes).\n- NFSD: move from strlcpy with unused retval to strscpy (git-fixes).\n- NFSD: Optimize DRC bucket pruning (git-fixes).\n- nfsd: return error if nfs4_setacl fails (git-fixes).\n- NFSD: set attributes when creating symlinks (git-fixes).\n- nfsd: use locks_inode_context helper (git-fixes).\n- nilfs2: Remove check for PageError (git-fixes).\n- nvme_core: scan namespaces asynchronously (bsc#1224105).\n- ocfs2: use coarse time for new created files (git-fixes).\n- padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).\n- perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).\n- platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).\n- platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).\n- platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).\n- platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779).\n- platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).\n- platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).\n- platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).\n- platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).\n- platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).\n- platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).\n- platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779).\n- platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).\n- platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).\n- power: supply: axp288_charger: Fix constant_charge_voltage writes (git-fixes).\n- power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes).\n- powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).\n- powerpc: Mark .opd section read-only (bsc#1194869).\n- powerpc: use generic version of arch_is_kernel_initmem_freed() (bsc#1194869).\n- powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).\n- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).\n- powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).\n- powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).\n- powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).\n- powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).\n- powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).\n- powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869).\n- powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).\n- powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).\n- powerpc/xmon: Check cpu id in commands 'c#', 'dp#' and 'dx#' (bsc#1194869).\n- RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).\n- RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)\n- RDMA/rxe: Fix rxe_modify_srq (git-fixes)\n- RDMA/rxe: Handle zero length rdma (git-fixes)\n- RDMA/rxe: Move work queue code to subroutines (git-fixes)\n- s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).\n- s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227079).\n- s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).\n- s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190).\n- s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229573).\n- s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).\n- s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229188).\n- spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).\n- sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).\n- SUNRPC: Fix a race to wake a sync task (git-fixes).\n- swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).\n- syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).\n- tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).\n- ubifs: add check for crypto_shash_tfm_digest (git-fixes).\n- ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).\n- ubifs: Fix adding orphan entry twice for the same inode (git-fixes).\n- ubifs: Fix unattached xattr inode if powercut happens after deleting (git-fixes).\n- vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).\n- wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).\n- wifi: mwifiex: duplicate static structs used in driver instances (git-fixes).\n- x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).\n- x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes).\n- x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).\n- x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).\n- x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes).\n- xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).\n- xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).\n- xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).\n- xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).\n- xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).\n","id":"SUSE-SU-2024:3209-1","modified":"2024-09-11T15:39:03Z","published":"2024-09-11T15:39:03Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243209-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194765"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196261"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206258"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221269"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222372"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223508"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224415"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224542"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225352"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226765"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226874"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227079"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227863"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228515"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228563"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228579"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228654"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228667"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228687"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228718"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228991"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229290"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229296"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229297"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229319"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229356"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229388"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229391"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229399"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229411"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229497"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229508"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229521"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229522"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229529"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229544"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229546"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229559"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229572"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229603"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229622"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229624"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229642"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229643"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229755"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229820"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-4441"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47517"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-38457"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-40133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48869"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48940"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52458"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38554"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42137"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42247"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42268"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42276"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42291"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44947"}],"related":["CVE-2021-4441","CVE-2021-47106","CVE-2021-47517","CVE-2021-47546","CVE-2022-38457","CVE-2022-40133","CVE-2022-48645","CVE-2022-48706","CVE-2022-48808","CVE-2022-48865","CVE-2022-48868","CVE-2022-48869","CVE-2022-48870","CVE-2022-48871","CVE-2022-48872","CVE-2022-48873","CVE-2022-48875","CVE-2022-48878","CVE-2022-48880","CVE-2022-48881","CVE-2022-48882","CVE-2022-48883","CVE-2022-48884","CVE-2022-48885","CVE-2022-48886","CVE-2022-48887","CVE-2022-48888","CVE-2022-48889","CVE-2022-48890","CVE-2022-48891","CVE-2022-48893","CVE-2022-48896","CVE-2022-48898","CVE-2022-48899","CVE-2022-48903","CVE-2022-48904","CVE-2022-48905","CVE-2022-48906","CVE-2022-48907","CVE-2022-48909","CVE-2022-48910","CVE-2022-48912","CVE-2022-48913","CVE-2022-48914","CVE-2022-48915","CVE-2022-48916","CVE-2022-48917","CVE-2022-48918","CVE-2022-48919","CVE-2022-48920","CVE-2022-48921","CVE-2022-48923","CVE-2022-48924","CVE-2022-48925","CVE-2022-48926","CVE-2022-48927","CVE-2022-48928","CVE-2022-48929","CVE-2022-48930","CVE-2022-48931","CVE-2022-48932","CVE-2022-48934","CVE-2022-48937","CVE-2022-48938","CVE-2022-48939","CVE-2022-48940","CVE-2022-48941","CVE-2022-48942","CVE-2022-48943","CVE-2023-3610","CVE-2023-52458","CVE-2023-52489","CVE-2023-52498","CVE-2023-52581","CVE-2023-52859","CVE-2023-52887","CVE-2023-52889","CVE-2023-52893","CVE-2023-52894","CVE-2023-52896","CVE-2023-52898","CVE-2023-52899","CVE-2023-52900","CVE-2023-52901","CVE-2023-52904","CVE-2023-52905","CVE-2023-52906","CVE-2023-52907","CVE-2023-52908","CVE-2023-52909","CVE-2023-52910","CVE-2023-52911","CVE-2023-52912","CVE-2023-52913","CVE-2024-26631","CVE-2024-26668","CVE-2024-26669","CVE-2024-26677","CVE-2024-26735","CVE-2024-26808","CVE-2024-26812","CVE-2024-26835","CVE-2024-26851","CVE-2024-27010","CVE-2024-27011","CVE-2024-27016","CVE-2024-27024","CVE-2024-27079","CVE-2024-27403","CVE-2024-31076","CVE-2024-35897","CVE-2024-35902","CVE-2024-35945","CVE-2024-35971","CVE-2024-36009","CVE-2024-36013","CVE-2024-36270","CVE-2024-36286","CVE-2024-36489","CVE-2024-36929","CVE-2024-36933","CVE-2024-36936","CVE-2024-36962","CVE-2024-38554","CVE-2024-38602","CVE-2024-38662","CVE-2024-39489","CVE-2024-40905","CVE-2024-40978","CVE-2024-40980","CVE-2024-40995","CVE-2024-41000","CVE-2024-41007","CVE-2024-41009","CVE-2024-41011","CVE-2024-41016","CVE-2024-41020","CVE-2024-41022","CVE-2024-41035","CVE-2024-41036","CVE-2024-41038","CVE-2024-41039","CVE-2024-41042","CVE-2024-41045","CVE-2024-41056","CVE-2024-41060","CVE-2024-41062","CVE-2024-41065","CVE-2024-41068","CVE-2024-41073","CVE-2024-41079","CVE-2024-41080","CVE-2024-41087","CVE-2024-41088","CVE-2024-41089","CVE-2024-41092","CVE-2024-41093","CVE-2024-41095","CVE-2024-41097","CVE-2024-41098","CVE-2024-42069","CVE-2024-42074","CVE-2024-42076","CVE-2024-42077","CVE-2024-42080","CVE-2024-42082","CVE-2024-42085","CVE-2024-42086","CVE-2024-42087","CVE-2024-42089","CVE-2024-42090","CVE-2024-42092","CVE-2024-42095","CVE-2024-42097","CVE-2024-42098","CVE-2024-42101","CVE-2024-42104","CVE-2024-42106","CVE-2024-42107","CVE-2024-42110","CVE-2024-42114","CVE-2024-42115","CVE-2024-42119","CVE-2024-42120","CVE-2024-42121","CVE-2024-42126","CVE-2024-42127","CVE-2024-42130","CVE-2024-42137","CVE-2024-42139","CVE-2024-42142","CVE-2024-42143","CVE-2024-42148","CVE-2024-42152","CVE-2024-42155","CVE-2024-42156","CVE-2024-42157","CVE-2024-42158","CVE-2024-42162","CVE-2024-42223","CVE-2024-42225","CVE-2024-42228","CVE-2024-42229","CVE-2024-42230","CVE-2024-42232","CVE-2024-42236","CVE-2024-42237","CVE-2024-42238","CVE-2024-42239","CVE-2024-42240","CVE-2024-42244","CVE-2024-42246","CVE-2024-42247","CVE-2024-42268","CVE-2024-42271","CVE-2024-42274","CVE-2024-42276","CVE-2024-42277","CVE-2024-42280","CVE-2024-42281","CVE-2024-42283","CVE-2024-42284","CVE-2024-42285","CVE-2024-42286","CVE-2024-42287","CVE-2024-42288","CVE-2024-42289","CVE-2024-42291","CVE-2024-42292","CVE-2024-42295","CVE-2024-42301","CVE-2024-42302","CVE-2024-42308","CVE-2024-42309","CVE-2024-42310","CVE-2024-42311","CVE-2024-42312","CVE-2024-42313","CVE-2024-42315","CVE-2024-42318","CVE-2024-42319","CVE-2024-42320","CVE-2024-42322","CVE-2024-43816","CVE-2024-43818","CVE-2024-43819","CVE-2024-43821","CVE-2024-43823","CVE-2024-43829","CVE-2024-43830","CVE-2024-43831","CVE-2024-43834","CVE-2024-43837","CVE-2024-43839","CVE-2024-43841","CVE-2024-43842","CVE-2024-43846","CVE-2024-43849","CVE-2024-43853","CVE-2024-43854","CVE-2024-43856","CVE-2024-43858","CVE-2024-43860","CVE-2024-43861","CVE-2024-43863","CVE-2024-43866","CVE-2024-43867","CVE-2024-43871","CVE-2024-43872","CVE-2024-43873","CVE-2024-43879","CVE-2024-43880","CVE-2024-43882","CVE-2024-43883","CVE-2024-43884","CVE-2024-43889","CVE-2024-43892","CVE-2024-43893","CVE-2024-43894","CVE-2024-43895","CVE-2024-43899","CVE-2024-43900","CVE-2024-43902","CVE-2024-43903","CVE-2024-43904","CVE-2024-43905","CVE-2024-43907","CVE-2024-43908","CVE-2024-43909","CVE-2024-44938","CVE-2024-44939","CVE-2024-44947"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-4441","CVE-2021-47106","CVE-2021-47517","CVE-2021-47546","CVE-2022-38457","CVE-2022-40133","CVE-2022-48645","CVE-2022-48706","CVE-2022-48808","CVE-2022-48865","CVE-2022-48868","CVE-2022-48869","CVE-2022-48870","CVE-2022-48871","CVE-2022-48872","CVE-2022-48873","CVE-2022-48875","CVE-2022-48878","CVE-2022-48880","CVE-2022-48881","CVE-2022-48882","CVE-2022-48883","CVE-2022-48884","CVE-2022-48885","CVE-2022-48886","CVE-2022-48887","CVE-2022-48888","CVE-2022-48889","CVE-2022-48890","CVE-2022-48891","CVE-2022-48893","CVE-2022-48896","CVE-2022-48898","CVE-2022-48899","CVE-2022-48903","CVE-2022-48904","CVE-2022-48905","CVE-2022-48906","CVE-2022-48907","CVE-2022-48909","CVE-2022-48910","CVE-2022-48912","CVE-2022-48913","CVE-2022-48914","CVE-2022-48915","CVE-2022-48916","CVE-2022-48917","CVE-2022-48918","CVE-2022-48919","CVE-2022-48920","CVE-2022-48921","CVE-2022-48923","CVE-2022-48924","CVE-2022-48925","CVE-2022-48926","CVE-2022-48927","CVE-2022-48928","CVE-2022-48929","CVE-2022-48930","CVE-2022-48931","CVE-2022-48932","CVE-2022-48934","CVE-2022-48937","CVE-2022-48938","CVE-2022-48939","CVE-2022-48940","CVE-2022-48941","CVE-2022-48942","CVE-2022-48943","CVE-2023-3610","CVE-2023-52458","CVE-2023-52489","CVE-2023-52498","CVE-2023-52581","CVE-2023-52859","CVE-2023-52887","CVE-2023-52889","CVE-2023-52893","CVE-2023-52894","CVE-2023-52896","CVE-2023-52898","CVE-2023-52899","CVE-2023-52900","CVE-2023-52901","CVE-2023-52904","CVE-2023-52905","CVE-2023-52906","CVE-2023-52907","CVE-2023-52908","CVE-2023-52909","CVE-2023-52910","CVE-2023-52911","CVE-2023-52912","CVE-2023-52913","CVE-2024-26631","CVE-2024-26668","CVE-2024-26669","CVE-2024-26677","CVE-2024-26735","CVE-2024-26808","CVE-2024-26812","CVE-2024-26835","CVE-2024-26851","CVE-2024-27010","CVE-2024-27011","CVE-2024-27016","CVE-2024-27024","CVE-2024-27079","CVE-2024-27403","CVE-2024-31076","CVE-2024-35897","CVE-2024-35902","CVE-2024-35945","CVE-2024-35971","CVE-2024-36009","CVE-2024-36013","CVE-2024-36270","CVE-2024-36286","CVE-2024-36489","CVE-2024-36929","CVE-2024-36933","CVE-2024-36936","CVE-2024-36962","CVE-2024-38554","CVE-2024-38602","CVE-2024-38662","CVE-2024-39489","CVE-2024-40905","CVE-2024-40978","CVE-2024-40980","CVE-2024-40995","CVE-2024-41000","CVE-2024-41007","CVE-2024-41009","CVE-2024-41011","CVE-2024-41016","CVE-2024-41020","CVE-2024-41022","CVE-2024-41035","CVE-2024-41036","CVE-2024-41038","CVE-2024-41039","CVE-2024-41042","CVE-2024-41045","CVE-2024-41056","CVE-2024-41060","CVE-2024-41062","CVE-2024-41065","CVE-2024-41068","CVE-2024-41073","CVE-2024-41079","CVE-2024-41080","CVE-2024-41087","CVE-2024-41088","CVE-2024-41089","CVE-2024-41092","CVE-2024-41093","CVE-2024-41095","CVE-2024-41097","CVE-2024-41098","CVE-2024-42069","CVE-2024-42074","CVE-2024-42076","CVE-2024-42077","CVE-2024-42080","CVE-2024-42082","CVE-2024-42085","CVE-2024-42086","CVE-2024-42087","CVE-2024-42089","CVE-2024-42090","CVE-2024-42092","CVE-2024-42095","CVE-2024-42097","CVE-2024-42098","CVE-2024-42101","CVE-2024-42104","CVE-2024-42106","CVE-2024-42107","CVE-2024-42110","CVE-2024-42114","CVE-2024-42115","CVE-2024-42119","CVE-2024-42120","CVE-2024-42121","CVE-2024-42126","CVE-2024-42127","CVE-2024-42130","CVE-2024-42137","CVE-2024-42139","CVE-2024-42142","CVE-2024-42143","CVE-2024-42148","CVE-2024-42152","CVE-2024-42155","CVE-2024-42156","CVE-2024-42157","CVE-2024-42158","CVE-2024-42162","CVE-2024-42223","CVE-2024-42225","CVE-2024-42228","CVE-2024-42229","CVE-2024-42230","CVE-2024-42232","CVE-2024-42236","CVE-2024-42237","CVE-2024-42238","CVE-2024-42239","CVE-2024-42240","CVE-2024-42244","CVE-2024-42246","CVE-2024-42247","CVE-2024-42268","CVE-2024-42271","CVE-2024-42274","CVE-2024-42276","CVE-2024-42277","CVE-2024-42280","CVE-2024-42281","CVE-2024-42283","CVE-2024-42284","CVE-2024-42285","CVE-2024-42286","CVE-2024-42287","CVE-2024-42288","CVE-2024-42289","CVE-2024-42291","CVE-2024-42292","CVE-2024-42295","CVE-2024-42301","CVE-2024-42302","CVE-2024-42308","CVE-2024-42309","CVE-2024-42310","CVE-2024-42311","CVE-2024-42312","CVE-2024-42313","CVE-2024-42315","CVE-2024-42318","CVE-2024-42319","CVE-2024-42320","CVE-2024-42322","CVE-2024-43816","CVE-2024-43818","CVE-2024-43819","CVE-2024-43821","CVE-2024-43823","CVE-2024-43829","CVE-2024-43830","CVE-2024-43831","CVE-2024-43834","CVE-2024-43837","CVE-2024-43839","CVE-2024-43841","CVE-2024-43842","CVE-2024-43846","CVE-2024-43849","CVE-2024-43853","CVE-2024-43854","CVE-2024-43856","CVE-2024-43858","CVE-2024-43860","CVE-2024-43861","CVE-2024-43863","CVE-2024-43866","CVE-2024-43867","CVE-2024-43871","CVE-2024-43872","CVE-2024-43873","CVE-2024-43879","CVE-2024-43880","CVE-2024-43882","CVE-2024-43883","CVE-2024-43884","CVE-2024-43889","CVE-2024-43892","CVE-2024-43893","CVE-2024-43894","CVE-2024-43895","CVE-2024-43899","CVE-2024-43900","CVE-2024-43902","CVE-2024-43903","CVE-2024-43904","CVE-2024-43905","CVE-2024-43907","CVE-2024-43908","CVE-2024-43909","CVE-2024-44938","CVE-2024-44939","CVE-2024-44947"]}