{"id":"SUSE-SU-2021:3751-1","summary":"Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3)","details":"This update for the Linux Kernel 4.4.180-94_147 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).\n- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).\n","modified":"2026-02-04T02:28:54.908364Z","published":"2021-11-19T16:20:11Z","related":["CVE-2021-0935","CVE-2021-3752"],"upstream":["CVE-2021-0935","CVE-2021-3752"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20213751-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-0935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3752"}],"affected":[{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_135-default":"14-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_37","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_138-default":"12-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_38","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_141-default":"11-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_39","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_39&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_144-default":"8-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_40","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_147-default":"5-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3751-1.json"}}],"schema_version":"1.7.3"}