{"id":"SUSE-SU-2024:3251-1","summary":"Security update for the Linux Kernel","details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-35965: Fix not validating setsockopt user input (bsc#1224579).\n- CVE-2024-35933: Fixed build regression (bsc#1224640).\n- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).\n- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).\n- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)\n- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).\n- CVE-2024-43863: Fix a deadlock in dma buf fence polling (bsc#1229497)\n- CVE-2024-41087: Fix double free on error (bsc#1228466).\n- CVE-2024-43907: Fix the null pointer dereference in apply_state_adjust_rules (bsc#1229787).\n- CVE-2024-43905: Fix the null pointer dereference for vega10_hwmgr (bsc#1229784).\n- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).\n- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).\n- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).\n- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).\n- CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).\n- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)\n- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).\n- CVE-2022-48910: Ensure we call ipv6_mc_down() at most once (bsc#1229632)\n- CVE-2023-52893: Fix null-deref in gsmi_get_variable (bsc#1229535)\n- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).\n- CVE-2022-48875: Initialize struct pn533_out_arg properly (bsc#1229516).\n- CVE-2023-52907: Wait for out_urb's completion in pn533_usb_send_frame() (bsc#1229526).\n- CVE-2024-43871: Fix memory leakage caused by driver API devm_free_percpu() (bsc#1229490)\n- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).\n- CVE-2024-43872: Fix soft lockup under heavy CEQE load (bsc#1229489)\n- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)\n- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).\n- CVE-2024-42236: Prevent OOB read/write in usb_string_copy() (bsc#1228964).\n- CVE-2024-42244: Fix crash on resume (bsc#1228967).\n- CVE-2024-43879: Handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (bsc#1229482).\n- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).\n- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).\n- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).\n- CVE-2024-41012: Remove locks reliably when fcntl/close race is detected (bsc#1228247).\n- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).\n- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290).\n- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).\n- CVE-2021-47341: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio (bsc#1224923).\n- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).\n- CVE-2022-48769: Avoid EFIv2 runtime services on Apple x86 machines (bsc#1226629).\n- CVE-2024-43856: Fix call order in dmam_free_coherent (bsc#1229346).\n- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)\n- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)\n- CVE-2024-40984: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (bsc#1227820).\n- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number') (bsc#1222387)\n- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)\n- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)\n- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)\n- CVE-2024-42310: Fix null pointer dereference in cdv_intel_lvds_get_modes (bsc#1229358)\n- CVE-2024-42309: Fix null pointer dereference in psb_intel_lvds_get_modes (bsc#1229359)\n- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)\n- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)\n- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).\n- CVE-2024-42285: Fix a use-after-free related to destroying CM IDs (bsc#1229381)\n- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).\n- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).\n- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)\n- CVE-2024-38618: Set lower bound of start tick time (bsc#1226754).\n- CVE-2024-41035: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (bsc#1228485)\n- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).\n- CVE-2023-52708: Fix error handling in mmc_spi_probe() (bsc#1225483).\n- CVE-2021-47549: Fix UAF in sata_fsl_port_stop when rmmod sata_fsl (bsc#1225508).\n- CVE-2021-47373: Fix potential VPE leak on error (bsc#1225190).\n- CVE-2021-47425: Fix resource leak in reconfiguration device addition (bsc#1225223).\n- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).\n- CVE-2024-41098: Fix null pointer dereference on error (bsc#1228467).\n- CVE-2021-4440: Drop USERGS_SYSRET64 paravirt call ( bsc#1227069).\n- CVE-2022-48786: Remove vsock from connected table when connect is interrupted by a signal (bsc#1227996).\n- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)\n- CVE-2024-35915: Fix uninit-value in nci_dev_up and nci_ntf_packet (bsc#1224479).\n- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).\n- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).\n- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).\n- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).\n- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).\n- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).\n- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).\n- CVE-2024-42090: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (bsc#1228449).\n- CVE-2024-42101: Fix null pointer dereference in nouveau_connector_get_modes (bsc#1228495).\n- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).\n- CVE-2021-47257: fix null deref in parse dev addr (bsc#1224896).\n\nThe following non-security bugs were fixed:\n\n- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)\n- Bluetooth: L2CAP: Fix deadlock (git-fixes).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1228982).\n- btrfs: Remove unused op_key var from add_delayed_refs (bsc#1228982).\n- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).\n- char: tpm: Protect tpm_pm_suspend with locks (bsc#1082555).\n- cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).\n- fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229457).\n- genirq: Delay deactivation in free_irq() (git-fixes).\n- genirq: Make sure the initial affinity is not empty (git-fixes).\n- genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).\n- genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes).\n- genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).\n- genirq/irqdomain: Check pointer in irq_domain_alloc_irqs_hierarchy() (git-fixes).\n- genirq/msi: Activate Multi-MSI early when MSI_FLAG_ACTIVATE_EARLY is set (git-fixes).\n- genirq/msi: Ensure deactivation on teardown (git-fixes).\n- genirq/proc: Reject invalid affinity masks (again) (git-fixes).\n- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).\n- ip6_tunnel: Fix broken GRO (bsc#1226323).\n- irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).\n- irqdomain: Fix association race (git-fixes).\n- irqdomain: Fix domain registration race (git-fixes).\n- irqdomain: Fix mapping-creation race (git-fixes).\n- irqdomain: Fixed unbalanced fwnode get and put (git-fixes).\n- irqdomain: Look for existing mapping only once (git-fixes).\n- irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).\n- kABI: do not change return type of tpm_tis_update_timeouts (bsc#1082555).\n- kABI: do not rename tpm_do_selftest, tpm_pcr_read_dev, and tpm1_getcap (bsc#1082555).\n- kABI: Do not rename tpm_getcap (bsc#1082555).\n- kABI: genirq: Delay deactivation in free_irq() (kabi git-fixes).\n- kABI: Hide the new last_cc member in a hole in struct tpm_chip (bsc#1082555).\n- kABI: Instead of changing the pcr argument type add a local variable of the desired type, and assign it from the actual argument (bsc#1082555).\n- kABI: no need to store the tpm long long duration in tpm_chip struct, it is an arbitrary hardcoded value (bsc#1082555).\n- kABI: re-export tpm2_calc_ordinal_duration (bsc#1082555).\n- kABI: tpm-interface: Hide new include from genksyms (bsc#1082555).\n- kABI: tpm2-space: Do not add buf_size to struct tpm_space (bsc#1082555).\n- kabi/severities: Ignore tpm_transmit_cmd and tpm_tis_core_init (bsc#1082555).\n- KVM: s390: Do not report unusabled IDs via KVM_CAP_MAX_VCPU_ID (git-fixes bsc#1229222).\n- memcg: protect concurrent access to mem_cgroup_idr (git-fixes).\n- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).\n- net: mana: Fix race on per-CQ variable napi work_done (bsc#1229154).\n- netfilter: nf_conntrack_h323: restore boundary check correctness (bsc#1223074)\n- netfilter: nf_ct_h323: Convert CHECK_BOUND macro to function (bsc#1223074)\n- netfilter: nf_ct_h323: Extend nf_h323_error_boundary to work on bits as well (bsc#1223074)\n- netfilter: nf_ct_h323: Out Of Bound Read in Netfilter Conntrack (bsc#1223074)\n- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).\n- nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).\n- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).\n- powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).\n- s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229229).\n- scsi: target: core: Silence the message about unknown VPD pages (bsc#1221252 bsc#1229462).\n- tpm_tis_core: Turn on the TPM before probing IRQ's (bsc#1082555).\n- tpm_tis: Add a check for invalid status (bsc#1082555).\n- tpm_tis: Explicitly check for error code (bsc#1082555).\n- tpm_tis: Fix an error handling path in 'tpm_tis_core_init()' (bsc#1082555).\n- tpm_tis: Resend command to recover from data transfer errors (bsc#1082555).\n- tpm_tis: reserve chip for duration of tpm_tis_core_init (bsc#1082555).\n- tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume (bsc#1082555).\n- tpm, tpm_tis: Avoid cache incoherency in test for interrupts (bsc#1082555).\n- tpm, tpm_tis: Claim locality before writing interrupt registers (bsc#1082555).\n- tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (bsc#1082555).\n- tpm, tpm_tis: Claim locality when interrupts are reenabled on resume (bsc#1082555).\n- tpm, tpm_tis: correct tpm_tis_flags enumeration values (bsc#1082555).\n- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1082555).\n- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1082555).\n- tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (bsc#1082555).\n- tpm, tpm_tis: Do not skip reset of original interrupt vector (bsc#1082555).\n- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1082555).\n- tpm, tpm_tis: Only handle supported interrupts (bsc#1082555).\n- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1082555).\n- tpm, tpm: Implement usage counter for locality (bsc#1082555).\n- tpm, tpmrm: Mark tpmrm_write as static (bsc#1082555).\n- tpm: access command header through struct in tpm_try_transmit() (bsc#1082555).\n- tpm: Actually fail on TPM errors during 'get random' (bsc#1082555).\n- tpm: Add a flag to indicate TPM power is managed by firmware (bsc#1082555).\n- tpm: add ptr to the tpm_space struct to file_priv (bsc#1082555).\n- tpm: add support for nonblocking operation (bsc#1082555).\n- tpm: add support for partial reads (bsc#1082555).\n- tpm: add tpm_auto_startup() into tpm-interface.c (bsc#1082555).\n- tpm: add tpm_calc_ordinal_duration() wrapper (bsc#1082555).\n- tpm: Allow system suspend to continue when TPM suspend fails (bsc#1082555).\n- tpm: clean up tpm_try_transmit() error handling flow (bsc#1082555).\n- tpm: declare struct tpm_header (bsc#1082555).\n- tpm: do not return bool from update_timeouts (bsc#1082555).\n- tpm: encapsulate tpm_dev_transmit() (bsc#1082555).\n- tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c (bsc#1082555).\n- tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c (bsc#1082555).\n- tpm: factor out tpm_get_timeouts() (bsc#1082555).\n- tpm: factor out tpm_startup function (bsc#1082555).\n- tpm: factor out tpm1_get_random into tpm1-cmd.c (bsc#1082555).\n- tpm: fix an invalid condition in tpm_common_poll (bsc#1082555).\n- tpm: fix Atmel TPM crash caused by too frequent queries (bsc#1082555).\n- tpm: Fix buffer access in tpm2_get_tpm_pt() (bsc#1082555).\n- tpm: fix buffer type in tpm_transmit_cmd (bsc#1082555).\n- tpm: fix byte order related arithmetic inconsistency in tpm_getcap() (bsc#1082555).\n- tpm: Fix error handling in async work (bsc#1082555).\n- tpm: fix invalid locking in NONBLOCKING mode (bsc#1082555).\n- tpm: fix invalid return value in pubek_show() (bsc#1082555).\n- tpm: fix NPE on probe for missing device (bsc#1082555).\n- tpm: Fix null pointer dereference on chip register error path (bsc#1082555).\n- tpm: Fix TIS locality timeout problems (bsc#1082555).\n- tpm: Handle negative priv-\u003eresponse_len in tpm_common_read() (bsc#1082555).\n- tpm: introduce tpm_chip_start() and tpm_chip_stop() (bsc#1082555).\n- tpm: migrate pubek_show to struct tpm_buf (bsc#1082555).\n- tpm: migrate tpm2_get_random() to use struct tpm_buf (bsc#1082555).\n- tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf (bsc#1082555).\n- tpm: migrate tpm2_probe() to use struct tpm_buf (bsc#1082555).\n- tpm: migrate tpm2_shutdown() to use struct tpm_buf (bsc#1082555).\n- tpm: move TPM 1.2 code of tpm_pcr_extend() to tpm1_pcr_extend() (bsc#1082555).\n- tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c (bsc#1082555).\n- tpm: move TPM space code out of tpm_transmit() (bsc#1082555).\n- tpm: move tpm_getcap to tpm1-cmd.c (bsc#1082555).\n- tpm: move tpm_validate_commmand() to tpm2-space.c (bsc#1082555).\n- tpm: move tpm1_pcr_extend to tpm1-cmd.c (bsc#1082555).\n- tpm: Prevent hwrng from activating during resume (bsc#1082555).\n- tpm: print tpm2_commit_space() error inside tpm2_commit_space() (bsc#1082555).\n- tpm: remove @flags from tpm_transmit() (bsc#1082555).\n- tpm: remove @space from tpm_transmit() (bsc#1082555).\n- tpm: remove struct tpm_pcrextend_in (bsc#1082555).\n- tpm: Remove tpm_dev_wq_lock (bsc#1082555).\n- tpm: remove TPM_TRANSMIT_UNLOCKED flag (bsc#1082555).\n- tpm: rename tpm_chip_find_get() to tpm_find_get_ops() (bsc#1082555).\n- tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED (bsc#1082555).\n- tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status() (bsc#1082555).\n- tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails (bsc#1082555).\n- tpm: Revert 'tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts' (bsc#1082555).\n- tpm: Revert 'tpm_tis_core: Turn on the TPM before probing IRQ's' (bsc#1082555).\n- tpm: Revert 'tpm_tis: reserve chip for duration of tpm_tis_core_init' (bsc#1082555).\n- tpm: take TPM chip power gating out of tpm_transmit() (bsc#1082555).\n- tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak (bsc#1082555).\n- tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak (bsc#1082555).\n- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (bsc#1082555).\n- tpm: tpm1_bios_measurements_next should increase position index (bsc#1082555).\n- tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure (bsc#1082555).\n- tpm: turn on TPM on suspend for TPM 1.x (bsc#1082555).\n- tpm: Unify the mismatching TPM space buffer sizes (bsc#1082555).\n- tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter (bsc#1082555).\n- tpm: use tpm_msleep() value as max delay (bsc#1082555).\n- tpm: use tpm_try_get_ops() in tpm-sysfs.c (bsc#1082555).\n- tpm: use u32 instead of int for PCR index (bsc#1082555).\n- tpm: vtpm_proxy: Avoid reading host log when using a virtual device (bsc#1082555).\n- tpm: vtpm_proxy: Prevent userspace from sending driver command (bsc#1082555).\n- tpm: Wrap the buffer from the caller to tpm_buf in tpm_send() (bsc#1082555).\n- tpm/tpm_crb: Fix error message in __crb_relinquish_locality() (bsc#1082555).\n- tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure (bsc#1082555).\n- tpm1: reimplement SAVESTATE using tpm_buf (bsc#1082555).\n- tpm1: reimplement tpm1_continue_selftest() using tpm_buf (bsc#1082555).\n- tpm1: rename tpm1_pcr_read_dev to tpm1_pcr_read() (bsc#1082555).\n- tpm2: add longer timeouts for creation commands (bsc#1082555).\n- vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).\n- vsock: correct removal of socket from the list (bsc#1227996).\n- xfs: fix getfsmap reporting past the last rt extent (git-fixes).\n- xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).\n- xfs: fix uninitialized variable access (git-fixes).\n","modified":"2026-02-04T02:21:09.952165Z","published":"2024-09-16T08:57:49Z","related":["CVE-2021-4440","CVE-2021-47257","CVE-2021-47289","CVE-2021-47341","CVE-2021-47373","CVE-2021-47425","CVE-2021-47549","CVE-2022-48751","CVE-2022-48769","CVE-2022-48786","CVE-2022-48822","CVE-2022-48865","CVE-2022-48875","CVE-2022-48896","CVE-2022-48899","CVE-2022-48905","CVE-2022-48910","CVE-2022-48919","CVE-2022-48920","CVE-2022-48925","CVE-2022-48930","CVE-2022-48931","CVE-2022-48938","CVE-2023-2176","CVE-2023-52708","CVE-2023-52893","CVE-2023-52901","CVE-2023-52907","CVE-2024-26668","CVE-2024-26677","CVE-2024-26812","CVE-2024-26851","CVE-2024-27011","CVE-2024-35915","CVE-2024-35933","CVE-2024-35965","CVE-2024-36013","CVE-2024-36270","CVE-2024-36286","CVE-2024-38618","CVE-2024-38662","CVE-2024-39489","CVE-2024-40984","CVE-2024-41012","CVE-2024-41016","CVE-2024-41020","CVE-2024-41035","CVE-2024-41062","CVE-2024-41068","CVE-2024-41087","CVE-2024-41097","CVE-2024-41098","CVE-2024-42077","CVE-2024-42082","CVE-2024-42090","CVE-2024-42101","CVE-2024-42106","CVE-2024-42110","CVE-2024-42148","CVE-2024-42155","CVE-2024-42157","CVE-2024-42158","CVE-2024-42162","CVE-2024-42226","CVE-2024-42228","CVE-2024-42232","CVE-2024-42236","CVE-2024-42240","CVE-2024-42244","CVE-2024-42246","CVE-2024-42259","CVE-2024-42271","CVE-2024-42280","CVE-2024-42281","CVE-2024-42284","CVE-2024-42285","CVE-2024-42286","CVE-2024-42287","CVE-2024-42288","CVE-2024-42289","CVE-2024-42301","CVE-2024-42309","CVE-2024-42310","CVE-2024-42312","CVE-2024-42322","CVE-2024-43819","CVE-2024-43831","CVE-2024-43839","CVE-2024-43853","CVE-2024-43854","CVE-2024-43856","CVE-2024-43861","CVE-2024-43863","CVE-2024-43866","CVE-2024-43871","CVE-2024-43872","CVE-2024-43879","CVE-2024-43882","CVE-2024-43883","CVE-2024-43892","CVE-2024-43893","CVE-2024-43900","CVE-2024-43902","CVE-2024-43905","CVE-2024-43907"],"upstream":["CVE-2021-4440","CVE-2021-47257","CVE-2021-47289","CVE-2021-47341","CVE-2021-47373","CVE-2021-47425","CVE-2021-47549","CVE-2022-48751","CVE-2022-48769","CVE-2022-48786","CVE-2022-48822","CVE-2022-48865","CVE-2022-48875","CVE-2022-48896","CVE-2022-48899","CVE-2022-48905","CVE-2022-48910","CVE-2022-48919","CVE-2022-48920","CVE-2022-48925","CVE-2022-48930","CVE-2022-48931","CVE-2022-48938","CVE-2023-2176","CVE-2023-52708","CVE-2023-52893","CVE-2023-52901","CVE-2023-52907","CVE-2024-26668","CVE-2024-26677","CVE-2024-26812","CVE-2024-26851","CVE-2024-27011","CVE-2024-35915","CVE-2024-35933","CVE-2024-35965","CVE-2024-36013","CVE-2024-36270","CVE-2024-36286","CVE-2024-38618","CVE-2024-38662","CVE-2024-39489","CVE-2024-40984","CVE-2024-41012","CVE-2024-41016","CVE-2024-41020","CVE-2024-41035","CVE-2024-41062","CVE-2024-41068","CVE-2024-41087","CVE-2024-41097","CVE-2024-41098","CVE-2024-42077","CVE-2024-42082","CVE-2024-42090","CVE-2024-42101","CVE-2024-42106","CVE-2024-42110","CVE-2024-42148","CVE-2024-42155","CVE-2024-42157","CVE-2024-42158","CVE-2024-42162","CVE-2024-42226","CVE-2024-42228","CVE-2024-42232","CVE-2024-42236","CVE-2024-42240","CVE-2024-42244","CVE-2024-42246","CVE-2024-42259","CVE-2024-42271","CVE-2024-42280","CVE-2024-42281","CVE-2024-42284","CVE-2024-42285","CVE-2024-42286","CVE-2024-42287","CVE-2024-42288","CVE-2024-42289","CVE-2024-42301","CVE-2024-42309","CVE-2024-42310","CVE-2024-42312","CVE-2024-42322","CVE-2024-43819","CVE-2024-43831","CVE-2024-43839","CVE-2024-43853","CVE-2024-43854","CVE-2024-43856","CVE-2024-43861","CVE-2024-43863","CVE-2024-43866","CVE-2024-43871","CVE-2024-43872","CVE-2024-43879","CVE-2024-43882","CVE-2024-43883","CVE-2024-43892","CVE-2024-43893","CVE-2024-43900","CVE-2024-43902","CVE-2024-43905","CVE-2024-43907"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243251-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224579"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225508"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227069"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228579"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228667"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229290"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229388"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229399"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229497"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229624"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-4440"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47425"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38618"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43907"}],"affected":[{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP5","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.228.1","gfs2-kmp-default":"4.12.14-122.228.1","ocfs2-kmp-default":"4.12.14-122.228.1","dlm-kmp-default":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_12_14-122_228-default":"1-8.3.1","kernel-default-kgraft":"4.12.14-122.228.1","kernel-default-kgraft-devel":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP5_Update_60","ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_60&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1-8.3.1"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_12_14-122_228-default":"1-8.3.1","kernel-default-kgraft":"4.12.14-122.228.1","kernel-default-kgraft-devel":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-docs","ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.2"}]}],"ecosystem_specific":{"binaries":[{"kernel-docs":"4.12.14-122.228.2","kernel-obs-build":"4.12.14-122.228.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-obs-build","ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.2"}]}],"ecosystem_specific":{"binaries":[{"kernel-docs":"4.12.14-122.228.2","kernel-obs-build":"4.12.14-122.228.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Server 12 SP5","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-122.228.1","kernel-devel":"4.12.14-122.228.1","kernel-syms":"4.12.14-122.228.1","kernel-default-devel":"4.12.14-122.228.1","kernel-default-base":"4.12.14-122.228.1","kernel-source":"4.12.14-122.228.1","kernel-default":"4.12.14-122.228.1","kernel-default-man":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-source","ecosystem":"SUSE:Linux Enterprise Server 12 SP5","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-122.228.1","kernel-devel":"4.12.14-122.228.1","kernel-syms":"4.12.14-122.228.1","kernel-default-devel":"4.12.14-122.228.1","kernel-default-base":"4.12.14-122.228.1","kernel-source":"4.12.14-122.228.1","kernel-default":"4.12.14-122.228.1","kernel-default-man":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-syms","ecosystem":"SUSE:Linux Enterprise Server 12 SP5","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-122.228.1","kernel-devel":"4.12.14-122.228.1","kernel-syms":"4.12.14-122.228.1","kernel-default-devel":"4.12.14-122.228.1","kernel-default-base":"4.12.14-122.228.1","kernel-source":"4.12.14-122.228.1","kernel-default":"4.12.14-122.228.1","kernel-default-man":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-122.228.1","kernel-devel":"4.12.14-122.228.1","kernel-syms":"4.12.14-122.228.1","kernel-default-devel":"4.12.14-122.228.1","kernel-default-base":"4.12.14-122.228.1","kernel-source":"4.12.14-122.228.1","kernel-default":"4.12.14-122.228.1","kernel-default-man":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-source","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-122.228.1","kernel-devel":"4.12.14-122.228.1","kernel-syms":"4.12.14-122.228.1","kernel-default-devel":"4.12.14-122.228.1","kernel-default-base":"4.12.14-122.228.1","kernel-source":"4.12.14-122.228.1","kernel-default":"4.12.14-122.228.1","kernel-default-man":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-syms","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-122.228.1","kernel-devel":"4.12.14-122.228.1","kernel-syms":"4.12.14-122.228.1","kernel-default-devel":"4.12.14-122.228.1","kernel-default-base":"4.12.14-122.228.1","kernel-source":"4.12.14-122.228.1","kernel-default":"4.12.14-122.228.1","kernel-default-man":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP5","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-122.228.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-default-extra":"4.12.14-122.228.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3251-1.json"}}],"schema_version":"1.7.3"}