{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.280.1","kernel-default-kgraft-devel":"4.12.14-122.280.1","kgraft-patch-4_12_14-122_280-default":"1-8.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.280.1","kernel-default-kgraft-devel":"4.12.14-122.280.1","kgraft-patch-4_12_14-122_280-default":"1-8.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_74","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_74&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.280.1","dlm-kmp-default":"4.12.14-122.280.1","gfs2-kmp-default":"4.12.14-122.280.1","kernel-default":"4.12.14-122.280.1","kernel-default-base":"4.12.14-122.280.1","kernel-default-devel":"4.12.14-122.280.1","kernel-default-man":"4.12.14-122.280.1","kernel-devel":"4.12.14-122.280.1","kernel-macros":"4.12.14-122.280.1","kernel-source":"4.12.14-122.280.1","kernel-syms":"4.12.14-122.280.1","ocfs2-kmp-default":"4.12.14-122.280.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.280.1","dlm-kmp-default":"4.12.14-122.280.1","gfs2-kmp-default":"4.12.14-122.280.1","kernel-default":"4.12.14-122.280.1","kernel-default-base":"4.12.14-122.280.1","kernel-default-devel":"4.12.14-122.280.1","kernel-default-man":"4.12.14-122.280.1","kernel-devel":"4.12.14-122.280.1","kernel-macros":"4.12.14-122.280.1","kernel-source":"4.12.14-122.280.1","kernel-syms":"4.12.14-122.280.1","ocfs2-kmp-default":"4.12.14-122.280.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.280.1","dlm-kmp-default":"4.12.14-122.280.1","gfs2-kmp-default":"4.12.14-122.280.1","kernel-default":"4.12.14-122.280.1","kernel-default-base":"4.12.14-122.280.1","kernel-default-devel":"4.12.14-122.280.1","kernel-default-man":"4.12.14-122.280.1","kernel-devel":"4.12.14-122.280.1","kernel-macros":"4.12.14-122.280.1","kernel-source":"4.12.14-122.280.1","kernel-syms":"4.12.14-122.280.1","ocfs2-kmp-default":"4.12.14-122.280.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.280.1","dlm-kmp-default":"4.12.14-122.280.1","gfs2-kmp-default":"4.12.14-122.280.1","kernel-default":"4.12.14-122.280.1","kernel-default-base":"4.12.14-122.280.1","kernel-default-devel":"4.12.14-122.280.1","kernel-devel":"4.12.14-122.280.1","kernel-macros":"4.12.14-122.280.1","kernel-source":"4.12.14-122.280.1","kernel-syms":"4.12.14-122.280.1","ocfs2-kmp-default":"4.12.14-122.280.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.280.1","dlm-kmp-default":"4.12.14-122.280.1","gfs2-kmp-default":"4.12.14-122.280.1","kernel-default":"4.12.14-122.280.1","kernel-default-base":"4.12.14-122.280.1","kernel-default-devel":"4.12.14-122.280.1","kernel-devel":"4.12.14-122.280.1","kernel-macros":"4.12.14-122.280.1","kernel-source":"4.12.14-122.280.1","kernel-syms":"4.12.14-122.280.1","ocfs2-kmp-default":"4.12.14-122.280.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.280.1","dlm-kmp-default":"4.12.14-122.280.1","gfs2-kmp-default":"4.12.14-122.280.1","kernel-default":"4.12.14-122.280.1","kernel-default-base":"4.12.14-122.280.1","kernel-default-devel":"4.12.14-122.280.1","kernel-devel":"4.12.14-122.280.1","kernel-macros":"4.12.14-122.280.1","kernel-source":"4.12.14-122.280.1","kernel-syms":"4.12.14-122.280.1","ocfs2-kmp-default":"4.12.14-122.280.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.280.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2021-4460: drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (bsc#1250764).\n- CVE-2022-48631: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 (bsc#1223475).\n- CVE-2022-50236: iommu/mediatek: Fix crash on isr after kexec() (bsc#1249702).\n- CVE-2022-50249: memory: of: Fix refcount leak bug in of_get_ddr_timings() (bsc#1249747).\n- CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806).\n- CVE-2022-50293: btrfs: do not BUG_ON() on ENOMEM when dropping extent items for a range (bsc#1249752).\n- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).\n- CVE-2022-50350: scsi: target: iscsi: Fix a race condition between login_work and the login thread (bsc#1250261).\n- CVE-2022-50356: net: sched: sfb: fix null pointer access issue when sfb_init() fails (bsc#1250040).\n- CVE-2022-50367: fs: fix UAF/GPF bug in nilfs_mdt_destroy (bsc#1250277).\n- CVE-2022-50394: i2c: ismt: Fix an out-of-bounds bug in ismt_access() (bsc#1250107).\n- CVE-2022-50395: integrity: Fix memory leakage in keyring allocation error path (bsc#1250211).\n- CVE-2022-50423: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).\n- CVE-2022-50443: drm/rockchip: lvds: fix PM usage counter unbalance in poweron (bsc#1250768).\n- CVE-2022-50459: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername() (bsc#1250850).\n- CVE-2022-50481: cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter() (bsc#1251051).\n- CVE-2022-50485: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1251197).\n- CVE-2022-50505: iommu/amd: Fix pci device refcount leak in ppr_notifier() (bsc#1251086).\n- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).\n- CVE-2022-50542: media: si470x: Fix use-after-free in si470x_int_in_callback() (bsc#1251330).\n- CVE-2022-50571: btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure (bsc#1252487).\n- CVE-2023-53183: btrfs: exit gracefully if reloc roots don't match (bsc#1249863).\n- CVE-2023-53185: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes (bsc#1249820).\n- CVE-2023-53188: net: openvswitch: fix race on port output (bsc#1249854).\n- CVE-2023-53191: irqchip/alpine-msi: Fix refcount leak in alpine_msix_init_domains (bsc#1249721).\n- CVE-2023-53204: af_unix: Fix data-races around user->unix_inflight (bsc#1249682).\n- CVE-2023-53271: ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume() (bsc#1249916).\n- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).\n- CVE-2023-53289: media: bdisp: Add missing check for create_workqueue (bsc#1249941).\n- CVE-2023-53292: blk-mq: protect q->elevator by ->sysfs_lock in blk_mq_elv_switch_none (bsc#1250163).\n- CVE-2023-53338: lwt: Fix return values of BPF xmit ops (bsc#1250074).\n- CVE-2023-53339: btrfs: fix BUG_ON condition in btrfs_cancel_balance (bsc#1250329).\n- CVE-2023-53373: crypto: seqiv - Handle EBUSY correctly (bsc#1250137).\n- CVE-2023-53433: net: add vlan_get_protocol_and_depth() helper (bsc#1250164).\n- CVE-2023-53476: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (bsc#1250839).\n- CVE-2023-53477: ipv6: Add lwtunnel encap size of all siblings in nexthop calculation (bsc#1250840).\n- CVE-2023-53484: lib: cpu_rmap: Avoid use after free on rmap->obj array entries (bsc#1250895).\n- CVE-2023-53517: tipc: do not update mtu if msg_max is too small in mtu negotiation (bsc#1250919).\n- CVE-2023-53519: media: v4l2-mem2mem: add lock to protect parameter num_rdy (bsc#1250964).\n- CVE-2023-53540: wifi: cfg80211: reject auth/assoc to AP with our address (bsc#1251053).\n- CVE-2023-53548: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb (bsc#1251066).\n- CVE-2023-53556: iavf: Fix use-after-free in free_netdev (bsc#1251059).\n- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).\n- CVE-2023-53582: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds (bsc#1251061).\n- CVE-2023-53589: wifi: iwlwifi: mvm: don't trust firmware n_channels (bsc#1251129).\n- CVE-2023-53593: cifs: Release folio lock on fscache read hit (bsc#1251132).\n- CVE-2023-53594: driver core: fix resource leak in device_add() (bsc#1251166).\n- CVE-2023-53596: drivers: base: Free devm resources when unregistering a device (bsc#1251161).\n- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).\n- CVE-2023-53620: md: fix soft lockup in status_resync.\n- CVE-2023-53624: net/sched: sch_fq: fix integer overflow of 'credit' (bsc#1251333).\n- CVE-2023-53635: netfilter: conntrack: fix wrong ct->timeout value (bsc#1251524).\n- CVE-2023-53648: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer (bsc#1251750).\n- CVE-2023-53687: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (bsc#1251772).\n- CVE-2023-53695: udf: Detect system inodes linked into directory hierarchy (bsc#1252539).\n- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).\n- CVE-2023-53707: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 (bsc#1252632).\n- CVE-2023-53715: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (bsc#1252545).\n- CVE-2023-53717: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (bsc#1252560).\n- CVE-2023-53733: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode (bsc#1252685).\n- CVE-2025-38539: trace/fgraph: Fix the warning caused by missing unregister notifier (bsc#1248211).\n- CVE-2025-38680: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (bsc#1249203).\n- CVE-2025-38691: pNFS: Fix uninited ptr deref in block/scsi layout (bsc#1249215).\n- CVE-2025-38695: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure (bsc#1249285).\n- CVE-2025-38699: scsi: bfa: Double-free fix (bsc#1249224).\n- CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182).\n- CVE-2025-38714: hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() (bsc#1249260).\n- CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161).\n- CVE-2025-38724: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (bsc#1249169).\n- CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302).\n- CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317).\n- CVE-2025-39724: serial: 8250: fix panic due to PSLVERR (bsc#1249265).\n- CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512).\n- CVE-2025-39772: drm/hisilicon/hibmc: fix the hibmc loaded failed bug (bsc#1249506).\n- CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202).\n- CVE-2025-39813: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump (bsc#1250032).\n- CVE-2025-39841: scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250274).\n- CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455).\n- CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400).\n- CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704).\n- CVE-2025-39923: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (bsc#1250741).\n- CVE-2025-39929: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path (bsc#1251036).\n- CVE-2025-39931: crypto: af_alg - Set merge to zero early in af_alg_sendmsg (bsc#1251100).\n- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).\n- CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177).\n- CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804).\n- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).\n- CVE-2025-39970: i40e: Fix filter input checks to prevent config with invalid values (bsc#1252051).\n- CVE-2025-39971: i40e: Add bounds check for ch[] array (bsc#1252052).\n- CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039).\n- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).\n- CVE-2025-39997: ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (bsc#1252056).\n- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).\n- CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785).\n- CVE-2025-40049: Squashfs: fix uninit-value in squashfs_get_parent (bsc#1252822).\n- CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789).\n- CVE-2025-40082: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1252775).\n- CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904).\n\nThe following non security issues were fixed:\n\n- NFSv4.1: fix backchannel max_resp_sz verification check (bsc#1247518).\n- net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265).\n- openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1249854)\n","id":"SUSE-SU-2025:4189-1","modified":"2025-11-24T09:18:05Z","published":"2025-11-24T09:18:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210124"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223475"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249215"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249265"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249302"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249863"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250137"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250261"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250311"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250455"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250741"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250895"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251059"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251283"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251286"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251294"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251522"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251736"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251741"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251804"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252265"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252685"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252775"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252822"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-4460"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-43945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50367"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50394"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50395"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50423"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50443"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50459"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50481"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50493"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50496"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50501"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50505"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50509"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50516"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50534"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50536"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50537"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50542"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50544"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50571"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53338"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53339"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53517"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53519"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53540"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53556"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53568"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53582"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53611"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53620"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53622"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53624"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53705"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53717"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-7324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38699"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39876"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40088"}],"related":["CVE-2021-4460","CVE-2022-43945","CVE-2022-48631","CVE-2022-50236","CVE-2022-50249","CVE-2022-50280","CVE-2022-50293","CVE-2022-50327","CVE-2022-50350","CVE-2022-50356","CVE-2022-50367","CVE-2022-50394","CVE-2022-50395","CVE-2022-50423","CVE-2022-50443","CVE-2022-50459","CVE-2022-50470","CVE-2022-50481","CVE-2022-50485","CVE-2022-50487","CVE-2022-50493","CVE-2022-50496","CVE-2022-50501","CVE-2022-50504","CVE-2022-50505","CVE-2022-50509","CVE-2022-50516","CVE-2022-50532","CVE-2022-50534","CVE-2022-50536","CVE-2022-50537","CVE-2022-50542","CVE-2022-50544","CVE-2022-50549","CVE-2022-50563","CVE-2022-50564","CVE-2022-50571","CVE-2022-50581","CVE-2023-53183","CVE-2023-53185","CVE-2023-53188","CVE-2023-53191","CVE-2023-53204","CVE-2023-53271","CVE-2023-53282","CVE-2023-53289","CVE-2023-53292","CVE-2023-53338","CVE-2023-53339","CVE-2023-53373","CVE-2023-53433","CVE-2023-53476","CVE-2023-53477","CVE-2023-53484","CVE-2023-53517","CVE-2023-53519","CVE-2023-53533","CVE-2023-53540","CVE-2023-53548","CVE-2023-53556","CVE-2023-53559","CVE-2023-53564","CVE-2023-53568","CVE-2023-53582","CVE-2023-53587","CVE-2023-53589","CVE-2023-53593","CVE-2023-53594","CVE-2023-53596","CVE-2023-53603","CVE-2023-53604","CVE-2023-53611","CVE-2023-53615","CVE-2023-53619","CVE-2023-53620","CVE-2023-53622","CVE-2023-53624","CVE-2023-53635","CVE-2023-53644","CVE-2023-53647","CVE-2023-53648","CVE-2023-53650","CVE-2023-53667","CVE-2023-53668","CVE-2023-53672","CVE-2023-53675","CVE-2023-53681","CVE-2023-53683","CVE-2023-53687","CVE-2023-53695","CVE-2023-53696","CVE-2023-53705","CVE-2023-53707","CVE-2023-53715","CVE-2023-53717","CVE-2023-53722","CVE-2023-53733","CVE-2023-7324","CVE-2024-56633","CVE-2025-38539","CVE-2025-38680","CVE-2025-38691","CVE-2025-38695","CVE-2025-38699","CVE-2025-38700","CVE-2025-38714","CVE-2025-38718","CVE-2025-38724","CVE-2025-39676","CVE-2025-39702","CVE-2025-39724","CVE-2025-39756","CVE-2025-39772","CVE-2025-39812","CVE-2025-39813","CVE-2025-39841","CVE-2025-39866","CVE-2025-39876","CVE-2025-39911","CVE-2025-39923","CVE-2025-39929","CVE-2025-39931","CVE-2025-39945","CVE-2025-39949","CVE-2025-39955","CVE-2025-39968","CVE-2025-39970","CVE-2025-39971","CVE-2025-39972","CVE-2025-39973","CVE-2025-39997","CVE-2025-40018","CVE-2025-40044","CVE-2025-40049","CVE-2025-40078","CVE-2025-40082","CVE-2025-40088"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-4460","CVE-2022-43945","CVE-2022-48631","CVE-2022-50236","CVE-2022-50249","CVE-2022-50280","CVE-2022-50293","CVE-2022-50327","CVE-2022-50350","CVE-2022-50356","CVE-2022-50367","CVE-2022-50394","CVE-2022-50395","CVE-2022-50423","CVE-2022-50443","CVE-2022-50459","CVE-2022-50470","CVE-2022-50481","CVE-2022-50485","CVE-2022-50487","CVE-2022-50493","CVE-2022-50496","CVE-2022-50501","CVE-2022-50504","CVE-2022-50505","CVE-2022-50509","CVE-2022-50516","CVE-2022-50532","CVE-2022-50534","CVE-2022-50536","CVE-2022-50537","CVE-2022-50542","CVE-2022-50544","CVE-2022-50549","CVE-2022-50563","CVE-2022-50564","CVE-2022-50571","CVE-2022-50581","CVE-2023-53183","CVE-2023-53185","CVE-2023-53188","CVE-2023-53191","CVE-2023-53204","CVE-2023-53271","CVE-2023-53282","CVE-2023-53289","CVE-2023-53292","CVE-2023-53338","CVE-2023-53339","CVE-2023-53373","CVE-2023-53433","CVE-2023-53476","CVE-2023-53477","CVE-2023-53484","CVE-2023-53517","CVE-2023-53519","CVE-2023-53533","CVE-2023-53540","CVE-2023-53548","CVE-2023-53556","CVE-2023-53559","CVE-2023-53564","CVE-2023-53568","CVE-2023-53582","CVE-2023-53587","CVE-2023-53589","CVE-2023-53593","CVE-2023-53594","CVE-2023-53596","CVE-2023-53603","CVE-2023-53604","CVE-2023-53611","CVE-2023-53615","CVE-2023-53619","CVE-2023-53620","CVE-2023-53622","CVE-2023-53624","CVE-2023-53635","CVE-2023-53644","CVE-2023-53647","CVE-2023-53648","CVE-2023-53650","CVE-2023-53667","CVE-2023-53668","CVE-2023-53672","CVE-2023-53675","CVE-2023-53681","CVE-2023-53683","CVE-2023-53687","CVE-2023-53695","CVE-2023-53696","CVE-2023-53705","CVE-2023-53707","CVE-2023-53715","CVE-2023-53717","CVE-2023-53722","CVE-2023-53733","CVE-2023-7324","CVE-2024-56633","CVE-2025-38539","CVE-2025-38680","CVE-2025-38691","CVE-2025-38695","CVE-2025-38699","CVE-2025-38700","CVE-2025-38714","CVE-2025-38718","CVE-2025-38724","CVE-2025-39676","CVE-2025-39702","CVE-2025-39724","CVE-2025-39756","CVE-2025-39772","CVE-2025-39812","CVE-2025-39813","CVE-2025-39841","CVE-2025-39866","CVE-2025-39876","CVE-2025-39911","CVE-2025-39923","CVE-2025-39929","CVE-2025-39931","CVE-2025-39945","CVE-2025-39949","CVE-2025-39955","CVE-2025-39968","CVE-2025-39970","CVE-2025-39971","CVE-2025-39972","CVE-2025-39973","CVE-2025-39997","CVE-2025-40018","CVE-2025-40044","CVE-2025-40049","CVE-2025-40078","CVE-2025-40082","CVE-2025-40088"]}