{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.247.1","kernel-default-kgraft-devel":"4.12.14-122.247.1","kgraft-patch-4_12_14-122_247-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.247.1","kernel-default-kgraft-devel":"4.12.14-122.247.1","kgraft-patch-4_12_14-122_247-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_65","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_65&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.247.1","dlm-kmp-default":"4.12.14-122.247.1","gfs2-kmp-default":"4.12.14-122.247.1","kernel-default":"4.12.14-122.247.1","kernel-default-base":"4.12.14-122.247.1","kernel-default-devel":"4.12.14-122.247.1","kernel-default-man":"4.12.14-122.247.1","kernel-devel":"4.12.14-122.247.1","kernel-macros":"4.12.14-122.247.1","kernel-source":"4.12.14-122.247.1","kernel-syms":"4.12.14-122.247.1","ocfs2-kmp-default":"4.12.14-122.247.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.247.1","dlm-kmp-default":"4.12.14-122.247.1","gfs2-kmp-default":"4.12.14-122.247.1","kernel-default":"4.12.14-122.247.1","kernel-default-base":"4.12.14-122.247.1","kernel-default-devel":"4.12.14-122.247.1","kernel-default-man":"4.12.14-122.247.1","kernel-devel":"4.12.14-122.247.1","kernel-macros":"4.12.14-122.247.1","kernel-source":"4.12.14-122.247.1","kernel-syms":"4.12.14-122.247.1","ocfs2-kmp-default":"4.12.14-122.247.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.247.1","dlm-kmp-default":"4.12.14-122.247.1","gfs2-kmp-default":"4.12.14-122.247.1","kernel-default":"4.12.14-122.247.1","kernel-default-base":"4.12.14-122.247.1","kernel-default-devel":"4.12.14-122.247.1","kernel-default-man":"4.12.14-122.247.1","kernel-devel":"4.12.14-122.247.1","kernel-macros":"4.12.14-122.247.1","kernel-source":"4.12.14-122.247.1","kernel-syms":"4.12.14-122.247.1","ocfs2-kmp-default":"4.12.14-122.247.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.247.1","dlm-kmp-default":"4.12.14-122.247.1","gfs2-kmp-default":"4.12.14-122.247.1","kernel-default":"4.12.14-122.247.1","kernel-default-base":"4.12.14-122.247.1","kernel-default-devel":"4.12.14-122.247.1","kernel-devel":"4.12.14-122.247.1","kernel-macros":"4.12.14-122.247.1","kernel-source":"4.12.14-122.247.1","kernel-syms":"4.12.14-122.247.1","ocfs2-kmp-default":"4.12.14-122.247.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.247.1","dlm-kmp-default":"4.12.14-122.247.1","gfs2-kmp-default":"4.12.14-122.247.1","kernel-default":"4.12.14-122.247.1","kernel-default-base":"4.12.14-122.247.1","kernel-default-devel":"4.12.14-122.247.1","kernel-devel":"4.12.14-122.247.1","kernel-macros":"4.12.14-122.247.1","kernel-source":"4.12.14-122.247.1","kernel-syms":"4.12.14-122.247.1","ocfs2-kmp-default":"4.12.14-122.247.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.247.1","dlm-kmp-default":"4.12.14-122.247.1","gfs2-kmp-default":"4.12.14-122.247.1","kernel-default":"4.12.14-122.247.1","kernel-default-base":"4.12.14-122.247.1","kernel-default-devel":"4.12.14-122.247.1","kernel-devel":"4.12.14-122.247.1","kernel-macros":"4.12.14-122.247.1","kernel-source":"4.12.14-122.247.1","kernel-syms":"4.12.14-122.247.1","ocfs2-kmp-default":"4.12.14-122.247.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.247.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47222: net: bridge: fix vlan tunnel dst refcnt when egressing (bsc#1224857).\n- CVE-2021-47223: net: bridge: fix vlan tunnel dst null pointer dereference (bsc#1224856).\n- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1222072).\n- CVE-2024-47809: dlm: fix possible lkb_resource null dereference (bsc#1235714).\n- CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727).\n- CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161).\n- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).\n- CVE-2024-52332: igb: Fix potential invalid memory access in igb_init_module() (bsc#1235700).\n- CVE-2024-53155: ocfs2: fix uninitialized value in ocfs2_file_read_iter() (bsc#1234855).\n- CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901).\n- CVE-2024-53197: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (bsc#1235464).\n- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).\n- CVE-2024-55916: Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (bsc#1235747).\n- CVE-2024-56369: drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (bsc#1235750).\n- CVE-2024-56532: ALSA: us122l: Use snd_card_free_when_closed() at disconnection (bsc#1235059).\n- CVE-2024-56533: ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (bsc#1235053).\n- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).\n- CVE-2024-56574: media: ts2020: fix null-ptr-deref in ts2020_probe() (bsc#1235040).\n- CVE-2024-56593: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (bsc#1235252).\n- CVE-2024-56594: drm/amdgpu: set the right AMDGPU sg segment limitation (bsc#1235413).\n- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).\n- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).\n- CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426).\n- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).\n- CVE-2024-56630: ocfs2: free inode when ocfs2_get_init_inode() fails (bsc#1235479).\n- CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523).\n- CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526).\n- CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132).\n- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).\n- CVE-2024-56662: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (bsc#1235533).\n- CVE-2024-56681: crypto: bcm - add error check in the ahash_hmac_init function (bsc#1235557).\n- CVE-2024-56700: media: wl128x: Fix atomicity violation in fmc_send_cmd() (bsc#1235500).\n- CVE-2024-56722: RDMA/hns: Fix cpu stuck caused by printings during reset (bsc#1235570).\n- CVE-2024-56739: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (bsc#1235611).\n- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).\n- CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627).\n- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).\n- CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638).\n- CVE-2024-56769: media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (bsc#1235155).\n- CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948).\n- CVE-2024-57890: RDMA/uverbs: Prevent integer overflow issue (bsc#1235919).\n- CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965).\n- CVE-2024-57899: wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (bsc#1235924).\n- CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967).\n- CVE-2024-57922: drm/amd/display: Add check for granularity in dml ceil/floor helpers (bsc#1236080).\n- CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096).\n- CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192).\n- CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190).\n- CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182).\n- CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161).\n- CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262).\n- CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698).\n- CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703).\n\nThe following non-security bugs were fixed:\n\n- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).\n- drm/modes: Switch to 64bit maths to avoid integer overflow (bsc#1235750).\n- vfio/pci: Lock external INTx masking ops (bsc#1222803).\n- btrfs: fstests btrfs/309 fails on btrfs (bsc#1221282).\n","id":"SUSE-SU-2025:0565-1","modified":"2025-02-17T13:28:23Z","published":"2025-02-17T13:28:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234855"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235059"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-48881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-55916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21682"}],"related":["CVE-2021-47222","CVE-2021-47223","CVE-2024-26644","CVE-2024-47809","CVE-2024-48881","CVE-2024-49948","CVE-2024-50142","CVE-2024-52332","CVE-2024-53155","CVE-2024-53185","CVE-2024-53197","CVE-2024-53227","CVE-2024-55916","CVE-2024-56369","CVE-2024-56532","CVE-2024-56533","CVE-2024-56539","CVE-2024-56574","CVE-2024-56593","CVE-2024-56594","CVE-2024-56600","CVE-2024-56601","CVE-2024-56615","CVE-2024-56623","CVE-2024-56630","CVE-2024-56637","CVE-2024-56641","CVE-2024-56643","CVE-2024-56650","CVE-2024-56661","CVE-2024-56662","CVE-2024-56681","CVE-2024-56700","CVE-2024-56722","CVE-2024-56739","CVE-2024-56747","CVE-2024-56748","CVE-2024-56759","CVE-2024-56763","CVE-2024-56769","CVE-2024-57884","CVE-2024-57890","CVE-2024-57896","CVE-2024-57899","CVE-2024-57903","CVE-2024-57922","CVE-2024-57929","CVE-2024-57931","CVE-2024-57932","CVE-2024-57938","CVE-2025-21653","CVE-2025-21664","CVE-2025-21678","CVE-2025-21682"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47222","CVE-2021-47223","CVE-2024-26644","CVE-2024-47809","CVE-2024-48881","CVE-2024-49948","CVE-2024-50142","CVE-2024-52332","CVE-2024-53155","CVE-2024-53185","CVE-2024-53197","CVE-2024-53227","CVE-2024-55916","CVE-2024-56369","CVE-2024-56532","CVE-2024-56533","CVE-2024-56539","CVE-2024-56574","CVE-2024-56593","CVE-2024-56594","CVE-2024-56600","CVE-2024-56601","CVE-2024-56615","CVE-2024-56623","CVE-2024-56630","CVE-2024-56637","CVE-2024-56641","CVE-2024-56643","CVE-2024-56650","CVE-2024-56661","CVE-2024-56662","CVE-2024-56681","CVE-2024-56700","CVE-2024-56722","CVE-2024-56739","CVE-2024-56747","CVE-2024-56748","CVE-2024-56759","CVE-2024-56763","CVE-2024-56769","CVE-2024-57884","CVE-2024-57890","CVE-2024-57896","CVE-2024-57899","CVE-2024-57903","CVE-2024-57922","CVE-2024-57929","CVE-2024-57931","CVE-2024-57932","CVE-2024-57938","CVE-2025-21653","CVE-2025-21664","CVE-2025-21678","CVE-2025-21682"]}