{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-11-rt":"3-1.2"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"kernel-livepatch-MICRO-6-0-RT_Update_3","purl":"pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_3&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3-1.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues:\n\n- CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998)\n- CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993)\n- CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679)\n- CVE-2024-56600: Fixed net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218)\n- CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452)\n- CVE-2024-57882: Fixed mptcp: fix TCP options overflow (bsc#1235916)\n- CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783)\n","id":"SUSE-SU-2025:20191-1","modified":"2025-04-17T10:19:01Z","published":"2025-04-17T10:19:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520191-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196281"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231993"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233679"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236783"},{"type":"REPORT","url":"https://bugzilla.suse.com/904970"},{"type":"REPORT","url":"https://bugzilla.suse.com/907150"},{"type":"REPORT","url":"https://bugzilla.suse.com/920615"},{"type":"REPORT","url":"https://bugzilla.suse.com/920633"},{"type":"REPORT","url":"https://bugzilla.suse.com/930408"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57882"}],"related":["CVE-2024-45016","CVE-2024-47684","CVE-2024-50302","CVE-2024-53104","CVE-2024-56600","CVE-2024-56648","CVE-2024-57882"],"summary":"Security update for kernel-livepatch-MICRO-6-0-RT_Update_3","upstream":["CVE-2024-45016","CVE-2024-47684","CVE-2024-50302","CVE-2024-53104","CVE-2024-56600","CVE-2024-56648","CVE-2024-57882"]}