{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.91.1","kernel-azure-base":"4.12.14-16.91.1","kernel-azure-devel":"4.12.14-16.91.1","kernel-devel-azure":"4.12.14-16.91.1","kernel-source-azure":"4.12.14-16.91.1","kernel-syms-azure":"4.12.14-16.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.91.1","kernel-azure-base":"4.12.14-16.91.1","kernel-azure-devel":"4.12.14-16.91.1","kernel-devel-azure":"4.12.14-16.91.1","kernel-source-azure":"4.12.14-16.91.1","kernel-syms-azure":"4.12.14-16.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.91.1","kernel-azure-base":"4.12.14-16.91.1","kernel-azure-devel":"4.12.14-16.91.1","kernel-devel-azure":"4.12.14-16.91.1","kernel-source-azure":"4.12.14-16.91.1","kernel-syms-azure":"4.12.14-16.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.91.1","kernel-azure-base":"4.12.14-16.91.1","kernel-azure-devel":"4.12.14-16.91.1","kernel-devel-azure":"4.12.14-16.91.1","kernel-source-azure":"4.12.14-16.91.1","kernel-syms-azure":"4.12.14-16.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.91.1","kernel-azure-base":"4.12.14-16.91.1","kernel-azure-devel":"4.12.14-16.91.1","kernel-devel-azure":"4.12.14-16.91.1","kernel-source-azure":"4.12.14-16.91.1","kernel-syms-azure":"4.12.14-16.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.91.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.91.1","kernel-azure-base":"4.12.14-16.91.1","kernel-azure-devel":"4.12.14-16.91.1","kernel-devel-azure":"4.12.14-16.91.1","kernel-source-azure":"4.12.14-16.91.1","kernel-syms-azure":"4.12.14-16.91.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.91.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: bfusb: fix division by zero in send path (git-fixes).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1114648).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).\n- RDMA/mlx5: Set user priority for DCT (bsc#1103991).\n- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).\n- Replace with an alternative fix for bsc#1185377\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add netif_set_xps_queue call (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Add rx buffer pagecnt bias (bsc#1191655).\n- gve: Allow pageflips on larger pages (bsc#1191655).\n- gve: Avoid freeing NULL pointer (bsc#1191655).\n- gve: Correct available tx qpl check (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: DQO: avoid unused variable warnings (bsc#1191655).\n- gve: Do lazy cleanup in TX path (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Switch to use napi_complete_done (bsc#1191655).\n- gve: Track RX buffer allocation failures (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix gve_get_stats() (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).\n- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).\n- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).\n- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).\n- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).\n- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).\n- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).\n- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).\n- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).\n- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).\n- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).\n- iavf: prevent accidental free of filter structure (bsc#1111981 ).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: Delete always true check of PF pointer (bsc#1118661 ).\n- ice: ignore dropped packets during init (bsc#1118661 ).\n- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).\n- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).\n- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).\n- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).\n- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).\n- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).\n- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).\n- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- phylib: fix potential use-after-free (bsc#1119113).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- rndis_host: support Hytera digital radios (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).\n- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).\n- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n","id":"SUSE-SU-2022:0765-1","modified":"2022-04-07T08:11:35Z","published":"2022-04-07T08:11:35Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220765-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1046306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1094978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097587"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101674"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1103991"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114648"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114685"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1118661"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1136460"},{"type":"REPORT","url":"https://bugzilla.suse.com/1136461"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174852"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191271"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195543"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195949"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195995"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196079"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-45095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0492"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0847"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-24448"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-24959"}],"related":["CVE-2021-44879","CVE-2021-45095","CVE-2022-0001","CVE-2022-0002","CVE-2022-0487","CVE-2022-0492","CVE-2022-0617","CVE-2022-0644","CVE-2022-0847","CVE-2022-24448","CVE-2022-24959"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-44879","CVE-2021-45095","CVE-2022-0001","CVE-2022-0002","CVE-2022-0487","CVE-2022-0492","CVE-2022-0617","CVE-2022-0644","CVE-2022-0847","CVE-2022-24448","CVE-2022-24959"]}