{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.94.1","kernel-source-rt":"5.14.21-150400.15.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.94.1","kernel-source-rt":"5.14.21-150400.15.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.94.1","kernel-source-rt":"5.14.21-150400.15.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.94.1","kernel-source-rt":"5.14.21-150400.15.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.94.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-45003: Don't evict inode under the inode lru traversing context. (bsc#1230245) \n\nThe following non-security bugs were fixed:\n\n- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section'. (bsc#1230413)\n- Revert 'mm/sparsemem: fix race in accessing memory_section->usage'. (bsc#1230413)\n- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()'. (bsc#1230413)\n","id":"SUSE-SU-2024:3403-1","modified":"2024-09-23T13:55:21Z","published":"2024-09-23T13:55:21Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243403-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230413"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45003"}],"related":["CVE-2024-45003"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2024-45003"]}