{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-devel-rt":"6.4.0-30.1","kernel-livepatch-6_4_0-30-rt":"1-1.3","kernel-rt":"6.4.0-30.1","kernel-rt-devel":"6.4.0-30.1","kernel-rt-livepatch":"6.4.0-30.1","kernel-source-rt":"6.4.0-30.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"kernel-livepatch-MICRO-6-0-RT_Update_7","purl":"pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_7&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-1.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-devel-rt":"6.4.0-30.1","kernel-livepatch-6_4_0-30-rt":"1-1.3","kernel-rt":"6.4.0-30.1","kernel-rt-devel":"6.4.0-30.1","kernel-rt-livepatch":"6.4.0-30.1","kernel-source-rt":"6.4.0-30.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-devel-rt":"6.4.0-30.1","kernel-livepatch-6_4_0-30-rt":"1-1.3","kernel-rt":"6.4.0-30.1","kernel-rt-devel":"6.4.0-30.1","kernel-rt-livepatch":"6.4.0-30.1","kernel-source-rt":"6.4.0-30.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757).\n- CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910).\n- CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).\n- CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157).\n- CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990).\n- CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970).\n- CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874).\n- CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882).\n- CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746).\n- CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066).\n- CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475).\n- CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184).\n- CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168).\n- CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).\n- CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171).\n- CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176).\n- CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167).\n- CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581).\n- CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585).\n- CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587).\n- CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600).\n- CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591).\n- CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).\n- CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720).\n- CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742).\n- CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815).\n- CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816).\n- CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).\n- CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819).\n- CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813).\n- CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812).\n- CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612).\n- CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (bsc#1240795).\n- CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797).\n- CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684).\n\nThe following non-security bugs were fixed:\n\n- ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable-fixes).\n- ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes).\n- ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git-fixes).\n- ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git-fixes).\n- ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes).\n- ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes).\n- ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes).\n- ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git-fixes).\n- HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable-fixes).\n- HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes).\n- Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git-fixes).\n- Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes).\n- PCI: Fix BAR resizing when VF BARs are assigned (git-fixes).\n- PCI: Fix reference leak in pci_register_host_bridge() (git-fixes).\n- PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes).\n- acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes).\n- affs: do not write overlarge OFS data block size fields (git-fixes).\n- affs: generate OFS sequence numbers starting at 1 (git-fixes).\n- arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052)\n- arch_topology: init capacity_freq_ref to 0 (bsc#1238052)\n- arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052)\n- arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes)\n- arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052)\n- arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052)\n- arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052)\n- arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052)\n- arm64: mm: Correct the update of max_pfn (git-fixes)\n- bpf: Check size for BTF-based ctx access of pointer members (git-fixes).\n- bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes).\n- bpf: avoid holding freeze_mutex during mmap operation (git-fixes).\n- bpf: fix potential error return (git-fixes).\n- bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes).\n- counter: fix privdata alignment (git-fixes).\n- counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes).\n- counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes).\n- cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052)\n- cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052)\n- cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052)\n  Keep the feature disabled by default on x86_64\n- drm/amd/pm/smu11: Prevent division by zero (git-fixes).\n- drm/amd/pm: Prevent division by zero (git-fixes).\n- drm/amd: Keep display off while going into S4 (stable-fixes).\n- drm/amdgpu/dma_buf: fix page_link check (git-fixes).\n- drm/amdgpu/gfx11: fix num_mec (git-fixes).\n- drm/dp_mst: Add a helper to queue a topology probe (stable-fixes).\n- drm/dp_mst: Factor out function to queue a topology probe work (stable-fixes).\n- drm/i915/huc: Fix fence not released on early probe errors (git-fixes).\n- drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes).\n- drm/sti: remove duplicate object names (git-fixes).\n- exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes).\n- firmware: cs_dsp: Ensure cs_dsp_load[_coeff]() returns 0 on success (git-fixes).\n- gpio: tegra186: fix resource handling in ACPI probe path (git-fixes).\n- hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable-fixes).\n- lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes).\n- libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Rename perf_cpu_map__default_new() to\n  perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309).\n- libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309).\n- mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes).\n- mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes).\n- mtd: rawnand: Add status chack in r852_ready() (git-fixes).\n- net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes).\n- net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes).\n- nfs: clear SB_RDONLY before getting superblock (bsc#1238565).\n- nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565).\n- nfsd: put dl_stid if fail to queue dl_recall (git-fixes).\n- ntb: Force physically contiguous allocation of rx ring buffers (git-fixes).\n- ntb: intel: Fix using link status DB's (git-fixes).\n- ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes).\n- ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes).\n- ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes).\n- ntb_perf: Fix printk format (git-fixes).\n- objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git-fixes).\n- objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes).\n- objtool: Fix segfault in ignore_unreachable_insn() (git-fixes).\n- perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309).\n- perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).\n- perf tools: annotate asm_pure_loop.S (bsc#1239906).\n- perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309).\n- platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes).\n- platform/x86: ISST: Correct command storage data length (git-fixes).\n- platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes).\n- powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes).\n- powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes).\n- powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes).\n- powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes).\n- rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013).\n- s390/cio: Fix CHPID \"configure\" attribute caching (git-fixes bsc#1240979).\n- s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978).\n- sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052)\n- security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375).\n- selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes).\n- selinux: Implement mptcp_add_subflow hook (bsc#1240375).\n- serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes).\n- smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616).\n- staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes).\n- topology: Set capacity_freq_ref in all cases (bsc#1238052)\n- tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).\n- tpm: tis: Double the timeout B to 4s (bsc#1235870).\n- tpm_tis: Move CRC check to generic send routine (bsc#1235870).\n- tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870).\n- tty: serial: 8250: Add Brainboxes XC devices (stable-fixes).\n- tty: serial: 8250: Add some more device IDs (stable-fixes).\n- tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes).\n- tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes).\n- ucsi_ccg: Do not show failed to get FW build information error (git-fixes).\n- usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes).\n- usb: xhci: correct debug message page size calculation (git-fixes).\n- usbnet:fix NPE during rx_complete (git-fixes).\n- wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes).\n- wifi: brcmfmac: keep power during suspend if board requires it (stable-fixes).\n- wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes).\n- wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes).\n- wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes).\n- xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550).\n- xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550).\n- xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550).\n","id":"SUSE-SU-2025:20283-1","modified":"2025-04-25T07:35:12Z","published":"2025-04-25T07:35:12Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520283-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231910"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237874"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237882"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238970"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239475"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239684"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239925"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240575"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240587"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240595"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240596"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240643"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240718"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240719"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240873"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240938"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27415"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58071"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21729"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21806"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-2312"}],"related":["CVE-2024-27415","CVE-2024-50038","CVE-2024-53124","CVE-2024-53139","CVE-2024-58018","CVE-2024-58071","CVE-2025-21729","CVE-2025-21755","CVE-2025-21806","CVE-2025-21836","CVE-2025-21863","CVE-2025-21873","CVE-2025-21875","CVE-2025-21881","CVE-2025-21884","CVE-2025-21887","CVE-2025-21889","CVE-2025-21894","CVE-2025-21895","CVE-2025-21905","CVE-2025-21906","CVE-2025-21908","CVE-2025-21909","CVE-2025-21910","CVE-2025-21912","CVE-2025-21913","CVE-2025-21914","CVE-2025-21915","CVE-2025-21916","CVE-2025-21917","CVE-2025-21918","CVE-2025-21922","CVE-2025-21923","CVE-2025-21924","CVE-2025-21927","CVE-2025-21928","CVE-2025-21930","CVE-2025-21934","CVE-2025-21935","CVE-2025-21936","CVE-2025-21937","CVE-2025-21941","CVE-2025-21943","CVE-2025-21948","CVE-2025-21950","CVE-2025-21951","CVE-2025-21953","CVE-2025-21956","CVE-2025-21957","CVE-2025-21960","CVE-2025-21961","CVE-2025-21966","CVE-2025-21968","CVE-2025-21969","CVE-2025-21970","CVE-2025-21971","CVE-2025-21972","CVE-2025-21975","CVE-2025-21978","CVE-2025-21979","CVE-2025-21981","CVE-2025-21991","CVE-2025-21992","CVE-2025-21993","CVE-2025-21995","CVE-2025-21996","CVE-2025-22001","CVE-2025-22003","CVE-2025-22007","CVE-2025-22008","CVE-2025-22009","CVE-2025-22010","CVE-2025-22013","CVE-2025-22014","CVE-2025-2312"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2024-27415","CVE-2024-50038","CVE-2024-53124","CVE-2024-53139","CVE-2024-58018","CVE-2024-58071","CVE-2025-21729","CVE-2025-21755","CVE-2025-21806","CVE-2025-21836","CVE-2025-21863","CVE-2025-21873","CVE-2025-21875","CVE-2025-21881","CVE-2025-21884","CVE-2025-21887","CVE-2025-21889","CVE-2025-21894","CVE-2025-21895","CVE-2025-21905","CVE-2025-21906","CVE-2025-21908","CVE-2025-21909","CVE-2025-21910","CVE-2025-21912","CVE-2025-21913","CVE-2025-21914","CVE-2025-21915","CVE-2025-21916","CVE-2025-21917","CVE-2025-21918","CVE-2025-21922","CVE-2025-21923","CVE-2025-21924","CVE-2025-21927","CVE-2025-21928","CVE-2025-21930","CVE-2025-21934","CVE-2025-21935","CVE-2025-21936","CVE-2025-21937","CVE-2025-21941","CVE-2025-21943","CVE-2025-21948","CVE-2025-21950","CVE-2025-21951","CVE-2025-21953","CVE-2025-21956","CVE-2025-21957","CVE-2025-21960","CVE-2025-21961","CVE-2025-21966","CVE-2025-21968","CVE-2025-21969","CVE-2025-21970","CVE-2025-21971","CVE-2025-21972","CVE-2025-21975","CVE-2025-21978","CVE-2025-21979","CVE-2025-21981","CVE-2025-21991","CVE-2025-21992","CVE-2025-21993","CVE-2025-21995","CVE-2025-21996","CVE-2025-22001","CVE-2025-22003","CVE-2025-22007","CVE-2025-22008","CVE-2025-22009","CVE-2025-22010","CVE-2025-22013","CVE-2025-22014","CVE-2025-2312"]}