{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.266.1","kernel-default-kgraft-devel":"4.12.14-122.266.1","kgraft-patch-4_12_14-122_266-default":"1-8.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.266.1","kernel-default-kgraft-devel":"4.12.14-122.266.1","kgraft-patch-4_12_14-122_266-default":"1-8.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_70","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_70&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.266.1","dlm-kmp-default":"4.12.14-122.266.1","gfs2-kmp-default":"4.12.14-122.266.1","kernel-default":"4.12.14-122.266.1","kernel-default-base":"4.12.14-122.266.1","kernel-default-devel":"4.12.14-122.266.1","kernel-default-man":"4.12.14-122.266.1","kernel-devel":"4.12.14-122.266.1","kernel-macros":"4.12.14-122.266.1","kernel-source":"4.12.14-122.266.1","kernel-syms":"4.12.14-122.266.1","ocfs2-kmp-default":"4.12.14-122.266.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.266.1","dlm-kmp-default":"4.12.14-122.266.1","gfs2-kmp-default":"4.12.14-122.266.1","kernel-default":"4.12.14-122.266.1","kernel-default-base":"4.12.14-122.266.1","kernel-default-devel":"4.12.14-122.266.1","kernel-default-man":"4.12.14-122.266.1","kernel-devel":"4.12.14-122.266.1","kernel-macros":"4.12.14-122.266.1","kernel-source":"4.12.14-122.266.1","kernel-syms":"4.12.14-122.266.1","ocfs2-kmp-default":"4.12.14-122.266.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.266.1","dlm-kmp-default":"4.12.14-122.266.1","gfs2-kmp-default":"4.12.14-122.266.1","kernel-default":"4.12.14-122.266.1","kernel-default-base":"4.12.14-122.266.1","kernel-default-devel":"4.12.14-122.266.1","kernel-default-man":"4.12.14-122.266.1","kernel-devel":"4.12.14-122.266.1","kernel-macros":"4.12.14-122.266.1","kernel-source":"4.12.14-122.266.1","kernel-syms":"4.12.14-122.266.1","ocfs2-kmp-default":"4.12.14-122.266.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.266.1","dlm-kmp-default":"4.12.14-122.266.1","gfs2-kmp-default":"4.12.14-122.266.1","kernel-default":"4.12.14-122.266.1","kernel-default-base":"4.12.14-122.266.1","kernel-default-devel":"4.12.14-122.266.1","kernel-devel":"4.12.14-122.266.1","kernel-macros":"4.12.14-122.266.1","kernel-source":"4.12.14-122.266.1","kernel-syms":"4.12.14-122.266.1","ocfs2-kmp-default":"4.12.14-122.266.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.266.1","dlm-kmp-default":"4.12.14-122.266.1","gfs2-kmp-default":"4.12.14-122.266.1","kernel-default":"4.12.14-122.266.1","kernel-default-base":"4.12.14-122.266.1","kernel-default-devel":"4.12.14-122.266.1","kernel-devel":"4.12.14-122.266.1","kernel-macros":"4.12.14-122.266.1","kernel-source":"4.12.14-122.266.1","kernel-syms":"4.12.14-122.266.1","ocfs2-kmp-default":"4.12.14-122.266.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.266.1","dlm-kmp-default":"4.12.14-122.266.1","gfs2-kmp-default":"4.12.14-122.266.1","kernel-default":"4.12.14-122.266.1","kernel-default-base":"4.12.14-122.266.1","kernel-default-devel":"4.12.14-122.266.1","kernel-devel":"4.12.14-122.266.1","kernel-macros":"4.12.14-122.266.1","kernel-source":"4.12.14-122.266.1","kernel-syms":"4.12.14-122.266.1","ocfs2-kmp-default":"4.12.14-122.266.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.266.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-47212: net/mlx5: Update error handler for UCTX and UMEM (bsc#1222709).\n- CVE-2021-47455: ptp: Fix possible memory leak in ptp_clock_register() (bsc#1225254).\n- CVE-2021-47527: serial: core: fix transmit-buffer reset and memleak (bsc#1227768).\n- CVE-2022-21546: scsi: target: Fix WRITE_SAME No Data Buffer crash (bsc#1242243).\n- CVE-2022-49154: KVM: SVM: fix panic on out-of-bounds guest IRQ (bsc#1238167).\n- CVE-2022-49622: netfilter: nf_tables: fix crash when nf_trace is enabled (bsc#1239042).\n- CVE-2022-49731: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (bsc#1239071).\n- CVE-2022-49764: kABI: workaround 'bpf: Prevent bpf program recursion for raw tracepoint probes' changes (bsc#1242301).\n- CVE-2022-49780: scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus() (bsc#1242262).\n- CVE-2022-49814: kcm: close race conditions on sk_receive_queue (bsc#1242498).\n- CVE-2022-49879: ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1242733).\n- CVE-2022-49881: wifi: cfg80211: fix memory leak in query_regdb_file() (bsc#1242481).\n- CVE-2022-49917: ipvs: fix WARNING in ip_vs_app_net_cleanup() (bsc#1242406).\n- CVE-2022-49921: net: sched: Fix use after free in red_enqueue() (bsc#1242359).\n- CVE-2022-50055: iavf: Fix adminq error handling (bsc#1245039).\n- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).\n- CVE-2022-50134: RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (bsc#1244802).\n- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).\n- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).\n- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).\n- CVE-2023-53020: l2tp: fix lockdep splat (bsc#1240224).\n- CVE-2023-53090: drm/amdkfd: Fix an illegal memory access (bsc#1242753).\n- CVE-2023-53091: ext4: update s_journal_inum if it changes after journal replay (bsc#1242767).\n- CVE-2023-53133: bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser() (bsc#1242423).\n- CVE-2024-26586: mlxsw: spectrum_acl_tcam: Fix stack corruption (bsc#1220243).\n- CVE-2024-26825: nfc: nci: free rx_data_reassembly skb on NCI device cleanup (bsc#1223065).\n- CVE-2024-26872: RDMA/srpt: Do not register event handler until srpt device is fully setup (bsc#1223115).\n- CVE-2024-26875: media: pvrusb2: fix uaf in pvr2_context_set_notify (bsc#1223118).\n- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).\n- CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).\n- CVE-2024-38588: ftrace: Fix possible use-after-free issue in ftrace_location() (bsc#1226837).\n- CVE-2024-57982: xfrm: state: fix out-of-bounds read during lookup (bsc#1237913).\n- CVE-2025-21898: ftrace: Avoid potential division by zero in function_stat_show() (bsc#1240610).\n- CVE-2025-21920: vlan: enforce underlying device type (bsc#1240686).\n- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).\n- CVE-2025-22035: tracing: Fix use-after-free in print_graph_function_flags during tracer switching (bsc#1241544).\n- CVE-2025-23149: tpm: do not start chip while suspended (bsc#1242758).\n- CVE-2025-37756: net: tls: explicitly disallow disconnect (bsc#1242515).\n- CVE-2025-37757: tipc: fix memory leak in tipc_link_xmit (bsc#1242521).\n- CVE-2025-37781: i2c: cros-ec-tunnel: defer probe if parent EC is not present (bsc#1242575).\n- CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849).\n- CVE-2025-37810: usb: dwc3: gadget: check that event count does not exceed event buffer length (bsc#1242906).\n- CVE-2025-37836: PCI: Fix reference leak in pci_register_host_bridge() (bsc#1242957).\n- CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call (bsc#1242946).\n- CVE-2025-37862: HID: pidff: Fix null pointer dereference in pidff_find_fields (bsc#1242982).\n- CVE-2025-37892: mtd: inftlcore: Add error check for inftl_read_oob() (bsc#1243536).\n- CVE-2025-37911: bnxt_en: Fix out-of-bound memcpy() during ethtool -w (bsc#1243469).\n- CVE-2025-37923: tracing: Fix oob write in trace_seq_to_buffer() (bsc#1243551).\n- CVE-2025-37927: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid (bsc#1243620).\n- CVE-2025-37928: dm-bufio: do not schedule in atomic context (bsc#1243621).\n- CVE-2025-37961: ipvs: fix uninit-value for saddr in do_output_route4 (bsc#1243523).\n- CVE-2025-37980: block: fix resource leak in blk_register_queue() error path (bsc#1243522).\n- CVE-2025-37982: wifi: wl1251: fix memory leak in wl1251_tx_work (bsc#1243524).\n- CVE-2025-37992: net_sched: Flush gso_skb list too during ->change() (bsc#1243698).\n- CVE-2025-37995: module: ensure that kobject_put() is safe for module type kobjects (bsc#1243827).\n- CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in output_userspace() (bsc#1243836).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38004: can: bcm: add locking for bcm_op runtime updates (bsc#1244274).\n- CVE-2025-38023: nfs: handle failure of nfs_get_lock_context in unlock path (bsc#1245004).\n- CVE-2025-38024: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (bsc#1245025).\n- CVE-2025-38061: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() (bsc#1245440).\n- CVE-2025-38072: libnvdimm/labels: Fix divide error in nd_label_data_init() (bsc#1244743).\n- CVE-2025-38078: ALSA: pcm: Fix race of buffer access at PCM OSS layer (bsc#1244737).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() (bsc#1226837).\n- ftrace: Return the first found result in lookup_rec() (bsc#1226837).\n- ftrace: Separate out functionality from ftrace_location_range() (bsc#1226837).\n- ftrace: Zero out ftrace hashes when a module is removed (bsc#1226837).\n- mnt: fix __detach_mounts infinite loop (bsc#1242140).\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- netfilter: nf_tables: consolidate rule verdict trace call (bsc#1239042).\n- netfilter: nf_tables: remove old nf_log based tracing (bsc#1239042).\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n- tracing: Fix compilation warning on arm32 (bsc#1243551).\n","id":"SUSE-SU-2025:02334-1","modified":"2025-07-16T13:46:06Z","published":"2025-07-16T13:46:06Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502334-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206880"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208542"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211226"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223118"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237913"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241544"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242281"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242406"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242515"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242521"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242575"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242753"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243522"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243551"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244936"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245004"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245024"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245131"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245455"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-43527"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47455"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2586"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49622"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49731"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49986"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26586"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38588"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37844"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38083"}],"related":["CVE-2021-43527","CVE-2021-47212","CVE-2021-47455","CVE-2022-1679","CVE-2022-21546","CVE-2022-2586","CVE-2022-3903","CVE-2022-4095","CVE-2022-4662","CVE-2022-49154","CVE-2022-49622","CVE-2022-49731","CVE-2022-49764","CVE-2022-49780","CVE-2022-49814","CVE-2022-49879","CVE-2022-49881","CVE-2022-49917","CVE-2022-49921","CVE-2022-49936","CVE-2022-49937","CVE-2022-49938","CVE-2022-49954","CVE-2022-49956","CVE-2022-49957","CVE-2022-49977","CVE-2022-49978","CVE-2022-49986","CVE-2022-49987","CVE-2022-49990","CVE-2022-50008","CVE-2022-50012","CVE-2022-50020","CVE-2022-50022","CVE-2022-50045","CVE-2022-50055","CVE-2022-50065","CVE-2022-50067","CVE-2022-50073","CVE-2022-50083","CVE-2022-50084","CVE-2022-50085","CVE-2022-50087","CVE-2022-50091","CVE-2022-50092","CVE-2022-50093","CVE-2022-50094","CVE-2022-50097","CVE-2022-50098","CVE-2022-50099","CVE-2022-50101","CVE-2022-50102","CVE-2022-50104","CVE-2022-50109","CVE-2022-50126","CVE-2022-50134","CVE-2022-50146","CVE-2022-50152","CVE-2022-50153","CVE-2022-50173","CVE-2022-50179","CVE-2022-50181","CVE-2022-50200","CVE-2022-50206","CVE-2022-50211","CVE-2022-50213","CVE-2022-50215","CVE-2022-50220","CVE-2023-1989","CVE-2023-3111","CVE-2023-52500","CVE-2023-52927","CVE-2023-53020","CVE-2023-53063","CVE-2023-53081","CVE-2023-53090","CVE-2023-53091","CVE-2023-53133","CVE-2023-53145","CVE-2024-26586","CVE-2024-26825","CVE-2024-26872","CVE-2024-26875","CVE-2024-35790","CVE-2024-35839","CVE-2024-36959","CVE-2024-38588","CVE-2024-57982","CVE-2025-21898","CVE-2025-21920","CVE-2025-21971","CVE-2025-22035","CVE-2025-23149","CVE-2025-37756","CVE-2025-37757","CVE-2025-37781","CVE-2025-37800","CVE-2025-37810","CVE-2025-37836","CVE-2025-37844","CVE-2025-37862","CVE-2025-37892","CVE-2025-37911","CVE-2025-37923","CVE-2025-37927","CVE-2025-37928","CVE-2025-37961","CVE-2025-37980","CVE-2025-37982","CVE-2025-37992","CVE-2025-37995","CVE-2025-37998","CVE-2025-38000","CVE-2025-38004","CVE-2025-38023","CVE-2025-38024","CVE-2025-38061","CVE-2025-38072","CVE-2025-38078","CVE-2025-38083"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-43527","CVE-2021-47212","CVE-2021-47455","CVE-2022-1679","CVE-2022-21546","CVE-2022-2586","CVE-2022-3903","CVE-2022-4095","CVE-2022-4662","CVE-2022-49154","CVE-2022-49622","CVE-2022-49731","CVE-2022-49764","CVE-2022-49780","CVE-2022-49814","CVE-2022-49879","CVE-2022-49881","CVE-2022-49917","CVE-2022-49921","CVE-2022-49936","CVE-2022-49937","CVE-2022-49938","CVE-2022-49954","CVE-2022-49956","CVE-2022-49957","CVE-2022-49977","CVE-2022-49978","CVE-2022-49986","CVE-2022-49987","CVE-2022-49990","CVE-2022-50008","CVE-2022-50012","CVE-2022-50020","CVE-2022-50022","CVE-2022-50045","CVE-2022-50055","CVE-2022-50065","CVE-2022-50067","CVE-2022-50073","CVE-2022-50083","CVE-2022-50084","CVE-2022-50085","CVE-2022-50087","CVE-2022-50091","CVE-2022-50092","CVE-2022-50093","CVE-2022-50094","CVE-2022-50097","CVE-2022-50098","CVE-2022-50099","CVE-2022-50101","CVE-2022-50102","CVE-2022-50104","CVE-2022-50109","CVE-2022-50126","CVE-2022-50134","CVE-2022-50146","CVE-2022-50152","CVE-2022-50153","CVE-2022-50173","CVE-2022-50179","CVE-2022-50181","CVE-2022-50200","CVE-2022-50206","CVE-2022-50211","CVE-2022-50213","CVE-2022-50215","CVE-2022-50220","CVE-2023-1989","CVE-2023-3111","CVE-2023-52500","CVE-2023-52927","CVE-2023-53020","CVE-2023-53063","CVE-2023-53081","CVE-2023-53090","CVE-2023-53091","CVE-2023-53133","CVE-2023-53145","CVE-2024-26586","CVE-2024-26825","CVE-2024-26872","CVE-2024-26875","CVE-2024-35790","CVE-2024-35839","CVE-2024-36959","CVE-2024-38588","CVE-2024-57982","CVE-2025-21898","CVE-2025-21920","CVE-2025-21971","CVE-2025-22035","CVE-2025-23149","CVE-2025-37756","CVE-2025-37757","CVE-2025-37781","CVE-2025-37800","CVE-2025-37810","CVE-2025-37836","CVE-2025-37844","CVE-2025-37862","CVE-2025-37892","CVE-2025-37911","CVE-2025-37923","CVE-2025-37927","CVE-2025-37928","CVE-2025-37961","CVE-2025-37980","CVE-2025-37982","CVE-2025-37992","CVE-2025-37995","CVE-2025-37998","CVE-2025-38000","CVE-2025-38004","CVE-2025-38023","CVE-2025-38024","CVE-2025-38061","CVE-2025-38072","CVE-2025-38078","CVE-2025-38083"]}