{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.258.1","kernel-default-kgraft-devel":"4.12.14-122.258.1","kgraft-patch-4_12_14-122_258-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.258.1","kernel-default-kgraft-devel":"4.12.14-122.258.1","kgraft-patch-4_12_14-122_258-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_68","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_68&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.258.1","dlm-kmp-default":"4.12.14-122.258.1","gfs2-kmp-default":"4.12.14-122.258.1","kernel-default":"4.12.14-122.258.1","kernel-default-base":"4.12.14-122.258.1","kernel-default-devel":"4.12.14-122.258.1","kernel-default-man":"4.12.14-122.258.1","kernel-devel":"4.12.14-122.258.1","kernel-macros":"4.12.14-122.258.1","kernel-source":"4.12.14-122.258.1","kernel-syms":"4.12.14-122.258.1","ocfs2-kmp-default":"4.12.14-122.258.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.258.1","dlm-kmp-default":"4.12.14-122.258.1","gfs2-kmp-default":"4.12.14-122.258.1","kernel-default":"4.12.14-122.258.1","kernel-default-base":"4.12.14-122.258.1","kernel-default-devel":"4.12.14-122.258.1","kernel-default-man":"4.12.14-122.258.1","kernel-devel":"4.12.14-122.258.1","kernel-macros":"4.12.14-122.258.1","kernel-source":"4.12.14-122.258.1","kernel-syms":"4.12.14-122.258.1","ocfs2-kmp-default":"4.12.14-122.258.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.258.1","dlm-kmp-default":"4.12.14-122.258.1","gfs2-kmp-default":"4.12.14-122.258.1","kernel-default":"4.12.14-122.258.1","kernel-default-base":"4.12.14-122.258.1","kernel-default-devel":"4.12.14-122.258.1","kernel-default-man":"4.12.14-122.258.1","kernel-devel":"4.12.14-122.258.1","kernel-macros":"4.12.14-122.258.1","kernel-source":"4.12.14-122.258.1","kernel-syms":"4.12.14-122.258.1","ocfs2-kmp-default":"4.12.14-122.258.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.258.1","dlm-kmp-default":"4.12.14-122.258.1","gfs2-kmp-default":"4.12.14-122.258.1","kernel-default":"4.12.14-122.258.1","kernel-default-base":"4.12.14-122.258.1","kernel-default-devel":"4.12.14-122.258.1","kernel-devel":"4.12.14-122.258.1","kernel-macros":"4.12.14-122.258.1","kernel-source":"4.12.14-122.258.1","kernel-syms":"4.12.14-122.258.1","ocfs2-kmp-default":"4.12.14-122.258.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.258.1","dlm-kmp-default":"4.12.14-122.258.1","gfs2-kmp-default":"4.12.14-122.258.1","kernel-default":"4.12.14-122.258.1","kernel-default-base":"4.12.14-122.258.1","kernel-default-devel":"4.12.14-122.258.1","kernel-devel":"4.12.14-122.258.1","kernel-macros":"4.12.14-122.258.1","kernel-source":"4.12.14-122.258.1","kernel-syms":"4.12.14-122.258.1","ocfs2-kmp-default":"4.12.14-122.258.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.258.1","dlm-kmp-default":"4.12.14-122.258.1","gfs2-kmp-default":"4.12.14-122.258.1","kernel-default":"4.12.14-122.258.1","kernel-default-base":"4.12.14-122.258.1","kernel-default-devel":"4.12.14-122.258.1","kernel-devel":"4.12.14-122.258.1","kernel-macros":"4.12.14-122.258.1","kernel-source":"4.12.14-122.258.1","kernel-syms":"4.12.14-122.258.1","ocfs2-kmp-default":"4.12.14-122.258.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.258.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47659: drm/plane: Move range check for format_count earlier (bsc#1237839).\n- CVE-2022-49044: dm integrity: fix memory corruption when tag_size is less than digest size (bsc#1237840).\n- CVE-2022-49055: drm/amdkfd: Check for potential null return of kmalloc_array() (bsc#1237868).\n- CVE-2022-49060: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (bsc#1237845).\n- CVE-2022-49086: net: openvswitch: fix leak of nested actions (bsc#1238037).\n- CVE-2022-49111: Bluetooth: Fix use after free in hci_send_acl (bsc#1237984).\n- CVE-2022-49118: scsi: hisi_sas: Free irq vectors in order for v3 HW (bsc#1237979).\n- CVE-2022-49121: scsi: pm8001: Fix tag leaks on error (bsc#1237926).\n- CVE-2022-49137: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (bsc#1238155).\n- CVE-2022-49175: PM: core: keep irq flags in device_pm_check_callbacks() (bsc#1238099).\n- CVE-2022-49176: bfq: fix use-after-free in bfq_dispatch_request (bsc#1238097).\n- CVE-2022-49179: block, bfq: do not move oom_bfqq (bsc#1238092).\n- CVE-2022-49188: remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (bsc#1238138).\n- CVE-2022-49197: af_netlink: Fix shift out of bounds in group mask calculation (bsc#1238455).\n- CVE-2022-49205: bpf, sockmap: Fix double uncharge the mem of sk_msg (bsc#1238335).\n- CVE-2022-49232: drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (bsc#1238139).\n- CVE-2022-49290: mac80211: fix potential double free on mesh join (bsc#1238156).\n- CVE-2022-49305: drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (bsc#1238645).\n- CVE-2022-49325: tcp: add accessors to read/set tp->snd_cwnd (bsc#1238398).\n- CVE-2022-49335: drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (bsc#1238377).\n- CVE-2022-49351: net: altera: Fix refcount leak in altera_tse_mdio_create (bsc#1237939).\n- CVE-2022-49385: driver: base: fix UAF when driver_attach failed (bsc#1237951).\n- CVE-2022-49390: macsec: fix UAF bug for real_dev (bsc#1238233).\n- CVE-2022-49411: bfq: Make sure bfqg for which we are queueing requests is online (bsc#1238307).\n- CVE-2022-49442: drivers/base/node.c: fix compaction sysfs file leak (bsc#1238243).\n- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).\n- CVE-2022-49478: media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (bsc#1238000).\n- CVE-2022-49489: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (bsc#1238244).\n- CVE-2022-49504: scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1238835).\n- CVE-2022-49521: scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1238938).\n- CVE-2022-49525: media: cx25821: Fix the warning when removing the module (bsc#1238022).\n- CVE-2022-49534: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1238893).\n- CVE-2022-49535: scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1238937).\n- CVE-2022-49536: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1238838).\n- CVE-2022-49537: scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1238930).\n- CVE-2022-49542: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1238722).\n- CVE-2022-49561: netfilter: conntrack: re-fetch conntrack after insertion (bsc#1238537).\n- CVE-2022-49590: igmp: Fix data-races around sysctl_igmp_llm_reports (bsc#1238844).\n- CVE-2022-49658: bpf, selftests: Add verifier test case for imm=0,umin=0,umax=1 scalar (bsc#1238803).\n- CVE-2022-49668: PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (bsc#1237957).\n- CVE-2022-49693: drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (bsc#1237954).\n- CVE-2022-49725: i40e: Fix call trace in setup_tx_descriptors (bsc#1238016).\n- CVE-2022-49728: kABI workaround for changeing the variable length type to size_t (bsc#1239111).\n- CVE-2022-49730: scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1239070).\n- CVE-2022-49749: i2c: designware: use casting of u64 in clock multiplication to avoid overflow (bsc#1240243).\n- CVE-2022-49753: dmaengine: Fix double increment of client_count in dma_chan_get() (bsc#1240250).\n- CVE-2023-53023: net: nfc: Fix use-after-free in local_cleanup() (bsc#1240309).\n- CVE-2023-53032: netfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function (bsc#1240270).\n- CVE-2024-49994: block: fix integer overflow in BLKSECDISCARD (bsc#1237757).\n- CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910).\n- CVE-2024-50272: filemap: Fix bounds checking in filemap_read() (bsc#1233461 bsc#1234209).\n- CVE-2024-52559: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (bsc#1238507).\n- CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729).\n- CVE-2024-56590: skbuff: introduce skb_pull_data (bsc#1235038).\n- CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526).\n- CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086).\n- CVE-2024-57980: media: uvcvideo: Fix double free in error path (bsc#1237911).\n- CVE-2024-57981: usb: xhci: Fix NULL pointer dereference on certain command aborts (bsc#1237912).\n- CVE-2024-58005: tpm: Change to kvalloc() in eventlog/acpi.c (bsc#1237873).\n- CVE-2024-58009: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (bsc#1238760).\n- CVE-2024-58017: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950 bsc#1239112).\n- CVE-2024-58063: wifi: rtlwifi: fix memory leaks and invalid access at probe error path (bsc#1238984).\n- CVE-2024-58093: PCI/ASPM: Fix link state exit during switch upstream function removal (bsc#1241347).\n- CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111).\n- CVE-2025-21735: NFC: nci: Add bounds checking in nci_hci_create_pipe() (bsc#1238497).\n- CVE-2025-21750: wifi: brcmfmac: Check the return value of of_property_read_string_index() (bsc#1238905).\n- CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737).\n- CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714).\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).\n- CVE-2025-21779: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (bsc#1238768).\n- CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746).\n- CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474).\n- CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).\n- CVE-2025-21909: wifi: nl80211: reject cooked mode if it is set along with other flags (bsc#1240590).\n- CVE-2025-21910: wifi: cfg80211: regulatory: improve invalid hints checking (bsc#1240583).\n- CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).\n- CVE-2025-21927: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (bsc#1240714).\n- CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709).\n- CVE-2025-21941: drm/amd/display: Fix null check for pipe_ctx->plane_state in (bsc#1240701).\n- CVE-2025-21948: HID: appleir: Fix potential NULL dereference at raw event handle (bsc#1240703).\n- CVE-2025-21956: drm/amd/display: Assign normalized_pix_clk when color depth = 14 (bsc#1240739).\n- CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742).\n- CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717).\n- CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740).\n- CVE-2025-21976: fbdev: hyperv_fb: Allow graceful removal of framebuffer (bsc#1241145).\n- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).\n- CVE-2025-22008: regulator: check that dummy regulator has been probed before using it (bsc#1240942).\n- CVE-2025-22010: RDMA/hns: Fix soft lockup during bt pages loop (bsc#1240943).\n- CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).\n- CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373).\n- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).\n- CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526).\n- CVE-2025-22086: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (bsc#1241458).\n- CVE-2025-23131: dlm: prevent NPD when writing a positive value to event_done (bsc#1241601).\n- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).\n\nThe following non-security bugs were fixed:\n\n- Revert 'ipv6: Fix signed integer overflow in __ip6_append_data'\n- Revert 'kABI workaround for changeing the variable length type to size_t'\n- audit: Send netlink ACK before setting connection in auditd_set (bsc#1231450).\n- brcmfmac: of: Use devm_kstrdup for board_type & check for errors (bsc#1238905)\n- brcmfmac: of: remove redundant variable len (bsc#1238905)\n- cifs: Fix integer overflow while processing actimeo mount option (git-fixes).\n- fbdev: hyperv_fb: Simplify hvfb_putmem (git-fixes).\n- net: Fix data-races around weight_p and dev_weight_[rt]x_bias (bsc#1238746)\n- remoteproc: qcom_q6v5_mss: Extract mba/mpss from memory-region (bsc#1238138)\n- tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).\n- tpm: tis: Double the timeout B to 4s (bsc#1235870).\n- wifi: brcmfmac: use strreplace() in brcmf_of_probe() (bsc#1238905)\n- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).\n- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).\n- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).\n","id":"SUSE-SU-2025:01600-1","modified":"2025-05-20T11:49:32Z","published":"2025-05-20T11:49:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501600-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231910"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233461"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237873"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237939"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238455"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238497"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238760"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238844"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238938"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239474"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240250"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240740"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241404"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241405"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241408"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241601"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49137"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49175"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49335"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49385"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49390"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49411"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49442"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49478"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49525"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49534"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49535"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49536"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49537"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49542"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49561"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49658"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49994"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-54683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21806"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37785"}],"related":["CVE-2020-36789","CVE-2021-47659","CVE-2021-47668","CVE-2021-47669","CVE-2022-49044","CVE-2022-49055","CVE-2022-49060","CVE-2022-49086","CVE-2022-49111","CVE-2022-49118","CVE-2022-49121","CVE-2022-49137","CVE-2022-49171","CVE-2022-49175","CVE-2022-49176","CVE-2022-49179","CVE-2022-49188","CVE-2022-49197","CVE-2022-49205","CVE-2022-49232","CVE-2022-49290","CVE-2022-49305","CVE-2022-49325","CVE-2022-49335","CVE-2022-49351","CVE-2022-49385","CVE-2022-49390","CVE-2022-49411","CVE-2022-49442","CVE-2022-49465","CVE-2022-49478","CVE-2022-49489","CVE-2022-49504","CVE-2022-49521","CVE-2022-49525","CVE-2022-49534","CVE-2022-49535","CVE-2022-49536","CVE-2022-49537","CVE-2022-49542","CVE-2022-49561","CVE-2022-49590","CVE-2022-49658","CVE-2022-49668","CVE-2022-49693","CVE-2022-49725","CVE-2022-49728","CVE-2022-49730","CVE-2022-49749","CVE-2022-49753","CVE-2023-53023","CVE-2023-53032","CVE-2024-46763","CVE-2024-46865","CVE-2024-49994","CVE-2024-50038","CVE-2024-50272","CVE-2024-52559","CVE-2024-54683","CVE-2024-56590","CVE-2024-56641","CVE-2024-57924","CVE-2024-57980","CVE-2024-57981","CVE-2024-58005","CVE-2024-58009","CVE-2024-58017","CVE-2024-58063","CVE-2024-58093","CVE-2025-21635","CVE-2025-21735","CVE-2025-21750","CVE-2025-21758","CVE-2025-21764","CVE-2025-21768","CVE-2025-21772","CVE-2025-21779","CVE-2025-21806","CVE-2025-21862","CVE-2025-21881","CVE-2025-21909","CVE-2025-21910","CVE-2025-21926","CVE-2025-21927","CVE-2025-21931","CVE-2025-21941","CVE-2025-21948","CVE-2025-21956","CVE-2025-21957","CVE-2025-21963","CVE-2025-21964","CVE-2025-21976","CVE-2025-22004","CVE-2025-22008","CVE-2025-22010","CVE-2025-22018","CVE-2025-22053","CVE-2025-22055","CVE-2025-22060","CVE-2025-22086","CVE-2025-23131","CVE-2025-37785"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2020-36789","CVE-2021-47659","CVE-2021-47668","CVE-2021-47669","CVE-2022-49044","CVE-2022-49055","CVE-2022-49060","CVE-2022-49086","CVE-2022-49111","CVE-2022-49118","CVE-2022-49121","CVE-2022-49137","CVE-2022-49171","CVE-2022-49175","CVE-2022-49176","CVE-2022-49179","CVE-2022-49188","CVE-2022-49197","CVE-2022-49205","CVE-2022-49232","CVE-2022-49290","CVE-2022-49305","CVE-2022-49325","CVE-2022-49335","CVE-2022-49351","CVE-2022-49385","CVE-2022-49390","CVE-2022-49411","CVE-2022-49442","CVE-2022-49465","CVE-2022-49478","CVE-2022-49489","CVE-2022-49504","CVE-2022-49521","CVE-2022-49525","CVE-2022-49534","CVE-2022-49535","CVE-2022-49536","CVE-2022-49537","CVE-2022-49542","CVE-2022-49561","CVE-2022-49590","CVE-2022-49658","CVE-2022-49668","CVE-2022-49693","CVE-2022-49725","CVE-2022-49728","CVE-2022-49730","CVE-2022-49749","CVE-2022-49753","CVE-2023-53023","CVE-2023-53032","CVE-2024-46763","CVE-2024-46865","CVE-2024-49994","CVE-2024-50038","CVE-2024-50272","CVE-2024-52559","CVE-2024-54683","CVE-2024-56590","CVE-2024-56641","CVE-2024-57924","CVE-2024-57980","CVE-2024-57981","CVE-2024-58005","CVE-2024-58009","CVE-2024-58017","CVE-2024-58063","CVE-2024-58093","CVE-2025-21635","CVE-2025-21735","CVE-2025-21750","CVE-2025-21758","CVE-2025-21764","CVE-2025-21768","CVE-2025-21772","CVE-2025-21779","CVE-2025-21806","CVE-2025-21862","CVE-2025-21881","CVE-2025-21909","CVE-2025-21910","CVE-2025-21926","CVE-2025-21927","CVE-2025-21931","CVE-2025-21941","CVE-2025-21948","CVE-2025-21956","CVE-2025-21957","CVE-2025-21963","CVE-2025-21964","CVE-2025-21976","CVE-2025-22004","CVE-2025-22008","CVE-2025-22010","CVE-2025-22018","CVE-2025-22053","CVE-2025-22055","CVE-2025-22060","CVE-2025-22086","CVE-2025-23131","CVE-2025-37785"]}