{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"5.3.18-150300.59.211.1","kernel-default-livepatch-devel":"5.3.18-150300.59.211.1","kernel-livepatch-5_3_18-150300_59_211-default":"1-150300.7.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"5.3.18-150300.59.211.1","kernel-default-livepatch-devel":"5.3.18-150300.59.211.1","kernel-livepatch-5_3_18-150300_59_211-default":"1-150300.7.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP3","name":"kernel-livepatch-SLE15-SP3_Update_59","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_59&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150300.7.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.3.18-150300.59.211.1","dlm-kmp-default":"5.3.18-150300.59.211.1","gfs2-kmp-default":"5.3.18-150300.59.211.1","ocfs2-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1.150300.18.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.212.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-preempt","purl":"pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","kernel-zfcpdump":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-zfcpdump","purl":"pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1.150300.18.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.212.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-preempt","purl":"pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1.150300.18.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1.150300.18.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1.150300.18.126.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.212.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-preempt","purl":"pkg:rpm/suse/kernel-preempt&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.3.18-150300.59.211.1","kernel-64kb-devel":"5.3.18-150300.59.211.1","kernel-default":"5.3.18-150300.59.211.1","kernel-default-base":"5.3.18-150300.59.211.1.150300.18.126.1","kernel-default-devel":"5.3.18-150300.59.211.1","kernel-devel":"5.3.18-150300.59.211.1","kernel-docs":"5.3.18-150300.59.211.1","kernel-macros":"5.3.18-150300.59.211.1","kernel-obs-build":"5.3.18-150300.59.212.1","kernel-preempt":"5.3.18-150300.59.211.1","kernel-preempt-devel":"5.3.18-150300.59.211.1","kernel-source":"5.3.18-150300.59.211.1","kernel-syms":"5.3.18-150300.59.211.1","reiserfs-kmp-default":"5.3.18-150300.59.211.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.211.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50085: dm raid: fix address sanitizer warning in raid_resume (bsc#1245147).\n- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).\n- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).\n- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).\n- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).\n- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).\n- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).\n- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')\n- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')\n- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')\n- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.\n- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82\n- Test the correct macro to detect RT kernel build Fixes: 470cd1a41502 ('kernel-binary: Support livepatch_rt with merged RT branch')\n- Use gcc-13 for build on SLE16 (jsc#PED-10028).\n- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.\n- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')\n- check-for-config-changes: Fix flag name typo\n- drop ax25 drivers (bsc#1238471).\n- drop hamradio drivers (bsc#1238471).\n- drop netrom drivers (bsc#1238471).\n- drop rose drivers (bsc#1238471).\n- kabi/severities: workaround kABI checker complains after AX25 and HAMRADIO removals KABI: symbol asc2ax(mod:net/ax25/ax25) lost KABI: symbol ax25_bcast(mod:net/ax25/ax25) lost KABI: symbol ax25_defaddr(mod:net/ax25/ax25) lost KABI: symbol ax25_display_timer(mod:net/ax25/ax25) lost KABI: symbol ax25_find_cb(mod:net/ax25/ax25) lost KABI: symbol ax25_findbyuid(mod:net/ax25/ax25) lost KABI: symbol ax25_header_ops(mod:net/ax25/ax25) lost KABI: symbol ax25_ip_xmit(mod:net/ax25/ax25) lost KABI: symbol ax25_linkfail_register(mod:net/ax25/ax25) lost KABI: symbol ax25_linkfail_release(mod:net/ax25/ax25) lost KABI: symbol ax25_listen_register(mod:net/ax25/ax25) lost KABI: symbol ax25_listen_release(mod:net/ax25/ax25) lost KABI: symbol ax25_protocol_release(mod:net/ax25/ax25) lost KABI: symbol ax25_register_pid(mod:net/ax25/ax25) lost KABI: symbol ax25_send_frame(mod:net/ax25/ax25) lost KABI: symbol ax25_uid_policy(mod:net/ax25/ax25) lost KABI: symbol ax25cmp(mod:net/ax25/ax25) lost KABI: symbol ax2asc(mod:net/ax25/ax25) lost KABI: symbol hdlcdrv_arbitrate(mod:drivers/net/hamradio/hdlcdrv) lost KABI: symbol hdlcdrv_receiver(mod:drivers/net/hamradio/hdlcdrv) lost KABI: symbol hdlcdrv_register(mod:drivers/net/hamradio/hdlcdrv) lost KABI: symbol hdlcdrv_transmitter(mod:drivers/net/hamradio/hdlcdrv) lost KABI: symbol hdlcdrv_unregister(mod:drivers/net/hamradio/hdlcdrv) lost KABI: symbol null_ax25_address(mod:net/ax25/ax25) lost\n- kernel-binary: Support livepatch_rt with merged RT branch\n- kernel-obs-qa: Use srchash for dependency as well\n- kernel-source: Also replace bin/env\n- kernel-source: Do not use multiple -r in sed parameters\n- kernel-source: Remove log.sh from sources\n- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)\n- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). When compiler different from the one which was used to configure the kernel is used to build modules a warning is issued and the build continues. This could be turned into an error but that would be too restrictive. The generated kernel-devel makefile could set the compiler but then the main Makefile as to be patched to assign CC with ?= This causes run_oldconfig failure on SUSE-2024 and kbuild config check failure on SUSE-2025. This cannot be hardcoded to one version in a regular patch because the value is expected to be configurable at mkspec time. Patch the Makefile after aplyin patches in rpm prep step instead. A check is added to verify that the sed command did indeed apply the change.\n- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used\n- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE\n- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.\n- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.\n- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).\n- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.\n- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev & systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)\n- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)\n- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)\n- rpm/package-descriptions: Add rt and rt_debug descriptions\n- rpm/release-projects: Update the ALP projects again (bsc#1231293).\n- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)\n- rpm: Stop using is_kotd_qa macro This macro is set by bs-upload-kernel, and a conditional in each spec file is used to determine when to build the spec file. This logic should not really be in the spec file. Previously this was done with package links and package meta for the individula links. However, the use of package links is rejected for packages in git based release projects (nothing to do with git actually, new policy). An alternative to package links is multibuild. However, for multibuild packages package meta cannot be used to set which spec file gets built. Use prjcon buildflags instead, and remove this conditional. Depends on bs-upload-kernel adding the build flag.\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n- wifi: cfg80211: Add my certificate (bsc#1243001).\n- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).\n","id":"SUSE-SU-2025:02308-1","modified":"2025-07-14T15:55:56Z","published":"2025-07-14T15:55:56Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502308-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1156395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206880"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211226"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243001"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243543"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244234"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244782"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244793"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244794"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244804"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244936"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245024"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245121"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245131"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245265"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245455"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2586"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49986"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50029"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50165"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50169"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50172"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38083"}],"related":["CVE-2022-1679","CVE-2022-2586","CVE-2022-2905","CVE-2022-3903","CVE-2022-4095","CVE-2022-4662","CVE-2022-49934","CVE-2022-49936","CVE-2022-49937","CVE-2022-49942","CVE-2022-49945","CVE-2022-49948","CVE-2022-49950","CVE-2022-49952","CVE-2022-49954","CVE-2022-49956","CVE-2022-49968","CVE-2022-49977","CVE-2022-49978","CVE-2022-49981","CVE-2022-49984","CVE-2022-49985","CVE-2022-49986","CVE-2022-49987","CVE-2022-49989","CVE-2022-49990","CVE-2022-49993","CVE-2022-50010","CVE-2022-50012","CVE-2022-50019","CVE-2022-50020","CVE-2022-50022","CVE-2022-50027","CVE-2022-50028","CVE-2022-50029","CVE-2022-50030","CVE-2022-50032","CVE-2022-50033","CVE-2022-50036","CVE-2022-50038","CVE-2022-50045","CVE-2022-50051","CVE-2022-50059","CVE-2022-50061","CVE-2022-50065","CVE-2022-50067","CVE-2022-50072","CVE-2022-50083","CVE-2022-50084","CVE-2022-50085","CVE-2022-50087","CVE-2022-50091","CVE-2022-50092","CVE-2022-50093","CVE-2022-50094","CVE-2022-50097","CVE-2022-50098","CVE-2022-50099","CVE-2022-50101","CVE-2022-50102","CVE-2022-50104","CVE-2022-50108","CVE-2022-50109","CVE-2022-50118","CVE-2022-50124","CVE-2022-50126","CVE-2022-50127","CVE-2022-50136","CVE-2022-50138","CVE-2022-50140","CVE-2022-50141","CVE-2022-50142","CVE-2022-50143","CVE-2022-50146","CVE-2022-50149","CVE-2022-50152","CVE-2022-50153","CVE-2022-50156","CVE-2022-50158","CVE-2022-50160","CVE-2022-50161","CVE-2022-50162","CVE-2022-50164","CVE-2022-50165","CVE-2022-50169","CVE-2022-50172","CVE-2022-50173","CVE-2022-50176","CVE-2022-50179","CVE-2022-50181","CVE-2022-50185","CVE-2022-50191","CVE-2022-50200","CVE-2022-50209","CVE-2022-50211","CVE-2022-50212","CVE-2022-50213","CVE-2022-50215","CVE-2022-50218","CVE-2022-50220","CVE-2022-50222","CVE-2022-50229","CVE-2022-50231","CVE-2023-3111","CVE-2024-26924","CVE-2024-27397","CVE-2024-36978","CVE-2024-46800","CVE-2024-53141","CVE-2024-56770","CVE-2025-21700","CVE-2025-21702","CVE-2025-21703","CVE-2025-37752","CVE-2025-37798","CVE-2025-37823","CVE-2025-37890","CVE-2025-37932","CVE-2025-37953","CVE-2025-37997","CVE-2025-38000","CVE-2025-38001","CVE-2025-38083"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-1679","CVE-2022-2586","CVE-2022-2905","CVE-2022-3903","CVE-2022-4095","CVE-2022-4662","CVE-2022-49934","CVE-2022-49936","CVE-2022-49937","CVE-2022-49942","CVE-2022-49945","CVE-2022-49948","CVE-2022-49950","CVE-2022-49952","CVE-2022-49954","CVE-2022-49956","CVE-2022-49968","CVE-2022-49977","CVE-2022-49978","CVE-2022-49981","CVE-2022-49984","CVE-2022-49985","CVE-2022-49986","CVE-2022-49987","CVE-2022-49989","CVE-2022-49990","CVE-2022-49993","CVE-2022-50010","CVE-2022-50012","CVE-2022-50019","CVE-2022-50020","CVE-2022-50022","CVE-2022-50027","CVE-2022-50028","CVE-2022-50029","CVE-2022-50030","CVE-2022-50032","CVE-2022-50033","CVE-2022-50036","CVE-2022-50038","CVE-2022-50045","CVE-2022-50051","CVE-2022-50059","CVE-2022-50061","CVE-2022-50065","CVE-2022-50067","CVE-2022-50072","CVE-2022-50083","CVE-2022-50084","CVE-2022-50085","CVE-2022-50087","CVE-2022-50091","CVE-2022-50092","CVE-2022-50093","CVE-2022-50094","CVE-2022-50097","CVE-2022-50098","CVE-2022-50099","CVE-2022-50101","CVE-2022-50102","CVE-2022-50104","CVE-2022-50108","CVE-2022-50109","CVE-2022-50118","CVE-2022-50124","CVE-2022-50126","CVE-2022-50127","CVE-2022-50136","CVE-2022-50138","CVE-2022-50140","CVE-2022-50141","CVE-2022-50142","CVE-2022-50143","CVE-2022-50146","CVE-2022-50149","CVE-2022-50152","CVE-2022-50153","CVE-2022-50156","CVE-2022-50158","CVE-2022-50160","CVE-2022-50161","CVE-2022-50162","CVE-2022-50164","CVE-2022-50165","CVE-2022-50169","CVE-2022-50172","CVE-2022-50173","CVE-2022-50176","CVE-2022-50179","CVE-2022-50181","CVE-2022-50185","CVE-2022-50191","CVE-2022-50200","CVE-2022-50209","CVE-2022-50211","CVE-2022-50212","CVE-2022-50213","CVE-2022-50215","CVE-2022-50218","CVE-2022-50220","CVE-2022-50222","CVE-2022-50229","CVE-2022-50231","CVE-2023-3111","CVE-2024-26924","CVE-2024-27397","CVE-2024-36978","CVE-2024-46800","CVE-2024-53141","CVE-2024-56770","CVE-2025-21700","CVE-2025-21702","CVE-2025-21703","CVE-2025-37752","CVE-2025-37798","CVE-2025-37823","CVE-2025-37890","CVE-2025-37932","CVE-2025-37953","CVE-2025-37997","CVE-2025-38000","CVE-2025-38001","CVE-2025-38083"]}