{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.234.1","kernel-default-kgraft-devel":"4.12.14-122.234.1","kgraft-patch-4_12_14-122_234-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.234.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.234.1","kernel-default-kgraft-devel":"4.12.14-122.234.1","kgraft-patch-4_12_14-122_234-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_62","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_62&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe Linux Enterprise 12 SP5 kernel turned LTSS (Extended Security)\n\nThe following security bugs were fixed:\n\n- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).\n- CVE-2021-47163: kABI fix for tipc: wait and exit until all work queues are done (bsc#1221980).\n- CVE-2021-47612: nfc: fix segfault in nfc_genl_dump_devices_done (bsc#1226585).\n- CVE-2022-48809: net: fix a memleak when uncloning an skb dst and its metadata (bsc#1227947).\n- CVE-2022-48951: ASoC: ops: Correct bounds check for second channel on SX controls (bsc#1231929).\n- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).\n- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).\n- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).\n- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).\n- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).\n- CVE-2022-48967: NFC: nci: Bounds check struct nfc_target arrays (bsc#1232304).\n- CVE-2022-48971: Bluetooth: Fix not cleanup led when bt_init fails (bsc#1232037).\n- CVE-2022-48972: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (bsc#1232025).\n- CVE-2022-48973: gpio: amd8111: Fix PCI device reference count leak (bsc#1232039).\n- CVE-2022-48978: HID: core: fix shift-out-of-bounds in hid_report_raw_event (bsc#1232038).\n- CVE-2022-48991: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths (bsc#1232070).\n- CVE-2022-48992: ASoC: soc-pcm: Add NULL check in BE reparenting (bsc#1232071).\n- CVE-2022-49000: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() (bsc#1232123).\n- CVE-2022-49002: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() (bsc#1232133).\n- CVE-2022-49010: hwmon: (coretemp) Check for null before removing sysfs attrs (bsc#1232172).\n- CVE-2022-49011: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (bsc#1232006).\n- CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1231890).\n- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).\n- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).\n- CVE-2022-49021: net: phy: fix null-ptr-deref while probe() failed (bsc#1231939).\n- CVE-2022-49026: e100: Fix possible use after free in e100_xmit_prepare (bsc#1231997).\n- CVE-2022-49027: iavf: Fix error handling in iavf_init_module() (bsc#1232007).\n- CVE-2022-49028: ixgbevf: Fix resource leak in ixgbevf_init_module() (bsc#1231996).\n- CVE-2022-49029: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (bsc#1231995).\n- CVE-2023-52898: xhci: Fix null pointer dereference when host dies (bsc#1229568).\n- CVE-2023-52918: media: pci: cx23885: check cx23885_vdev_init() return (bsc#1232047).\n- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).\n- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).\n- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).\n- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).\n- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620).\n- CVE-2024-42114: netlink: extend policy range validation (bsc#1228564 prerequisite).\n- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005 stable-fixes).\n- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837 stable-fixes).\n- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).\n- CVE-2024-46724: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (bsc#1230725).\n- CVE-2024-46755: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (bsc#1230802).\n- CVE-2024-46802: drm/amd/display: added NULL check at start of dc_validate_stream (bsc#1231111).\n- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).\n- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).\n- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).\n- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).\n- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).\n- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).\n- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).\n- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).\n- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).\n- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).\n- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).\n- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).\n- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).\n- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).\n- CVE-2024-47697: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (bsc#1231858).\n- CVE-2024-47698: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (bsc#1231859).\n- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).\n- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).\n- CVE-2024-47713: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (bsc#1232016).\n- CVE-2024-47735: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (bsc#1232111).\n- CVE-2024-47737: nfsd: call cache_put if xdr_reserve_space returns NULL (bsc#1232056).\n- CVE-2024-47742: firmware_loader: Block path traversal (bsc#1232126).\n- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).\n- CVE-2024-49851: tpm: Clean up TPM space after command failure (bsc#1232134).\n- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).\n- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).\n- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).\n- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).\n- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).\n- CVE-2024-49891: scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1232218).\n- CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354).\n- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).\n- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305).\n- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).\n- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).\n- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).\n- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).\n- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).\n- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).\n- CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (bsc#1232314).\n- CVE-2024-49966: ocfs2: cancel dqi_sync_work before freeing oinfo (bsc#1232141).\n- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).\n- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).\n- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).\n- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).\n- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).\n- CVE-2024-50007: ALSA: asihpi: Fix potential OOB array access (bsc#1232394).\n- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).\n- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).\n- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).\n- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).\n- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).\n- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).\n\nThe following non-security bugs were fixed:\n\n- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)\n- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)\n- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)\n- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)\n- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).\n- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).\n- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).\n- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)\n- kernel-binary: generate and install compile_commands.json (bsc#1228971)\n- net: usb: usbnet: fix name regression (get-fixes).\n- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).\n- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).\n- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).\n","id":"SUSE-SU-2024:4100-1","modified":"2024-11-28T12:42:12Z","published":"2024-11-28T12:42:12Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226606"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230405"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231938"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231939"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231995"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231997"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232026"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232069"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232286"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232442"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49029"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-46343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38538"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42253"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50058"}],"related":["CVE-2021-46936","CVE-2021-47163","CVE-2021-47416","CVE-2021-47612","CVE-2022-48788","CVE-2022-48789","CVE-2022-48790","CVE-2022-48809","CVE-2022-48946","CVE-2022-48949","CVE-2022-48951","CVE-2022-48956","CVE-2022-48958","CVE-2022-48960","CVE-2022-48962","CVE-2022-48966","CVE-2022-48967","CVE-2022-48969","CVE-2022-48971","CVE-2022-48972","CVE-2022-48973","CVE-2022-48978","CVE-2022-48985","CVE-2022-48988","CVE-2022-48991","CVE-2022-48992","CVE-2022-48997","CVE-2022-49000","CVE-2022-49002","CVE-2022-49010","CVE-2022-49011","CVE-2022-49014","CVE-2022-49015","CVE-2022-49020","CVE-2022-49021","CVE-2022-49026","CVE-2022-49027","CVE-2022-49028","CVE-2022-49029","CVE-2023-46343","CVE-2023-52881","CVE-2023-52898","CVE-2023-52918","CVE-2023-52919","CVE-2023-6270","CVE-2024-26804","CVE-2024-27043","CVE-2024-38538","CVE-2024-39476","CVE-2024-40965","CVE-2024-41016","CVE-2024-41082","CVE-2024-42114","CVE-2024-42145","CVE-2024-42253","CVE-2024-44931","CVE-2024-44958","CVE-2024-46724","CVE-2024-46755","CVE-2024-46802","CVE-2024-46809","CVE-2024-46813","CVE-2024-46816","CVE-2024-46818","CVE-2024-46826","CVE-2024-46834","CVE-2024-46840","CVE-2024-46841","CVE-2024-46848","CVE-2024-47670","CVE-2024-47672","CVE-2024-47673","CVE-2024-47674","CVE-2024-47684","CVE-2024-47685","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47706","CVE-2024-47707","CVE-2024-47713","CVE-2024-47735","CVE-2024-47737","CVE-2024-47742","CVE-2024-47745","CVE-2024-47749","CVE-2024-49851","CVE-2024-49860","CVE-2024-49877","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49890","CVE-2024-49891","CVE-2024-49894","CVE-2024-49896","CVE-2024-49901","CVE-2024-49920","CVE-2024-49929","CVE-2024-49936","CVE-2024-49949","CVE-2024-49957","CVE-2024-49958","CVE-2024-49959","CVE-2024-49962","CVE-2024-49965","CVE-2024-49966","CVE-2024-49967","CVE-2024-49982","CVE-2024-49991","CVE-2024-49995","CVE-2024-49996","CVE-2024-50006","CVE-2024-50007","CVE-2024-50024","CVE-2024-50033","CVE-2024-50035","CVE-2024-50045","CVE-2024-50047","CVE-2024-50058"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-46936","CVE-2021-47163","CVE-2021-47416","CVE-2021-47612","CVE-2022-48788","CVE-2022-48789","CVE-2022-48790","CVE-2022-48809","CVE-2022-48946","CVE-2022-48949","CVE-2022-48951","CVE-2022-48956","CVE-2022-48958","CVE-2022-48960","CVE-2022-48962","CVE-2022-48966","CVE-2022-48967","CVE-2022-48969","CVE-2022-48971","CVE-2022-48972","CVE-2022-48973","CVE-2022-48978","CVE-2022-48985","CVE-2022-48988","CVE-2022-48991","CVE-2022-48992","CVE-2022-48997","CVE-2022-49000","CVE-2022-49002","CVE-2022-49010","CVE-2022-49011","CVE-2022-49014","CVE-2022-49015","CVE-2022-49020","CVE-2022-49021","CVE-2022-49026","CVE-2022-49027","CVE-2022-49028","CVE-2022-49029","CVE-2023-46343","CVE-2023-52881","CVE-2023-52898","CVE-2023-52918","CVE-2023-52919","CVE-2023-6270","CVE-2024-26804","CVE-2024-27043","CVE-2024-38538","CVE-2024-39476","CVE-2024-40965","CVE-2024-41016","CVE-2024-41082","CVE-2024-42114","CVE-2024-42145","CVE-2024-42253","CVE-2024-44931","CVE-2024-44958","CVE-2024-46724","CVE-2024-46755","CVE-2024-46802","CVE-2024-46809","CVE-2024-46813","CVE-2024-46816","CVE-2024-46818","CVE-2024-46826","CVE-2024-46834","CVE-2024-46840","CVE-2024-46841","CVE-2024-46848","CVE-2024-47670","CVE-2024-47672","CVE-2024-47673","CVE-2024-47674","CVE-2024-47684","CVE-2024-47685","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47706","CVE-2024-47707","CVE-2024-47713","CVE-2024-47735","CVE-2024-47737","CVE-2024-47742","CVE-2024-47745","CVE-2024-47749","CVE-2024-49851","CVE-2024-49860","CVE-2024-49877","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49890","CVE-2024-49891","CVE-2024-49894","CVE-2024-49896","CVE-2024-49901","CVE-2024-49920","CVE-2024-49929","CVE-2024-49936","CVE-2024-49949","CVE-2024-49957","CVE-2024-49958","CVE-2024-49959","CVE-2024-49962","CVE-2024-49965","CVE-2024-49966","CVE-2024-49967","CVE-2024-49982","CVE-2024-49991","CVE-2024-49995","CVE-2024-49996","CVE-2024-50006","CVE-2024-50007","CVE-2024-50024","CVE-2024-50033","CVE-2024-50035","CVE-2024-50045","CVE-2024-50047","CVE-2024-50058"]}