{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.255.1","kernel-default-kgraft-devel":"4.12.14-122.255.1","kgraft-patch-4_12_14-122_255-default":"1-8.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.255.1","kernel-default-kgraft-devel":"4.12.14-122.255.1","kgraft-patch-4_12_14-122_255-default":"1-8.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_67","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_67&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.255.1","dlm-kmp-default":"4.12.14-122.255.1","gfs2-kmp-default":"4.12.14-122.255.1","kernel-default":"4.12.14-122.255.1","kernel-default-base":"4.12.14-122.255.1","kernel-default-devel":"4.12.14-122.255.1","kernel-default-man":"4.12.14-122.255.1","kernel-devel":"4.12.14-122.255.1","kernel-macros":"4.12.14-122.255.1","kernel-source":"4.12.14-122.255.1","kernel-syms":"4.12.14-122.255.1","ocfs2-kmp-default":"4.12.14-122.255.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.255.1","dlm-kmp-default":"4.12.14-122.255.1","gfs2-kmp-default":"4.12.14-122.255.1","kernel-default":"4.12.14-122.255.1","kernel-default-base":"4.12.14-122.255.1","kernel-default-devel":"4.12.14-122.255.1","kernel-default-man":"4.12.14-122.255.1","kernel-devel":"4.12.14-122.255.1","kernel-macros":"4.12.14-122.255.1","kernel-source":"4.12.14-122.255.1","kernel-syms":"4.12.14-122.255.1","ocfs2-kmp-default":"4.12.14-122.255.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.255.1","dlm-kmp-default":"4.12.14-122.255.1","gfs2-kmp-default":"4.12.14-122.255.1","kernel-default":"4.12.14-122.255.1","kernel-default-base":"4.12.14-122.255.1","kernel-default-devel":"4.12.14-122.255.1","kernel-default-man":"4.12.14-122.255.1","kernel-devel":"4.12.14-122.255.1","kernel-macros":"4.12.14-122.255.1","kernel-source":"4.12.14-122.255.1","kernel-syms":"4.12.14-122.255.1","ocfs2-kmp-default":"4.12.14-122.255.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.255.1","dlm-kmp-default":"4.12.14-122.255.1","gfs2-kmp-default":"4.12.14-122.255.1","kernel-default":"4.12.14-122.255.1","kernel-default-base":"4.12.14-122.255.1","kernel-default-devel":"4.12.14-122.255.1","kernel-devel":"4.12.14-122.255.1","kernel-macros":"4.12.14-122.255.1","kernel-source":"4.12.14-122.255.1","kernel-syms":"4.12.14-122.255.1","ocfs2-kmp-default":"4.12.14-122.255.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.255.1","dlm-kmp-default":"4.12.14-122.255.1","gfs2-kmp-default":"4.12.14-122.255.1","kernel-default":"4.12.14-122.255.1","kernel-default-base":"4.12.14-122.255.1","kernel-default-devel":"4.12.14-122.255.1","kernel-devel":"4.12.14-122.255.1","kernel-macros":"4.12.14-122.255.1","kernel-source":"4.12.14-122.255.1","kernel-syms":"4.12.14-122.255.1","ocfs2-kmp-default":"4.12.14-122.255.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.255.1","dlm-kmp-default":"4.12.14-122.255.1","gfs2-kmp-default":"4.12.14-122.255.1","kernel-default":"4.12.14-122.255.1","kernel-default-base":"4.12.14-122.255.1","kernel-default-devel":"4.12.14-122.255.1","kernel-devel":"4.12.14-122.255.1","kernel-macros":"4.12.14-122.255.1","kernel-source":"4.12.14-122.255.1","kernel-syms":"4.12.14-122.255.1","ocfs2-kmp-default":"4.12.14-122.255.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.255.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).\n- CVE-2021-47645: media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (bsc#1237767).\n- CVE-2021-47648: gpu: host1x: Fix a memory leak in 'host1x_remove()' (bsc#1237725).\n- CVE-2022-49046: i2c: dev: check return value when calling dev_set_name() (bsc#1237842).\n- CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903).\n- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).\n- CVE-2022-49059: nfc: nci: add flush_workqueue to prevent uaf (bsc#1238007).\n- CVE-2022-49074: irqchip/gic-v3: Fix GICR_CTLR.RWP polling (bsc#1237728).\n- CVE-2022-49075: btrfs: fix qgroup reserve overflow the qgroup limit (bsc#1237733).\n- CVE-2022-49084: qede: confirm skb is allocated before using (bsc#1237751).\n- CVE-2022-49107: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1237973).\n- CVE-2022-49109: ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1237836).\n- CVE-2022-49119: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() (bsc#1237925).\n- CVE-2022-49120: scsi: pm8001: Fix task leak in pm8001_send_abort_all() (bsc#1237969).\n- CVE-2022-49209: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full (bsc#1238252).\n- CVE-2022-49220: dax: make sure inodes are flushed before destroy cache (bsc#1237936).\n- CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb (bsc#1238719).\n- CVE-2022-49286: tpm: use try_get_ops() in tpm-space.c (bsc#1238647).\n- CVE-2022-49292: ALSA: oss: Fix PCM OSS buffer allocation overflow (bsc#1238625).\n- CVE-2022-49308: extcon: Modify extcon device to be created after driver data is set (bsc#1238654).\n- CVE-2022-49331: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (bsc#1237813).\n- CVE-2022-49344: af_unix: Fix a data-race in unix_dgram_peer_wake_me() (bsc#1237988).\n- CVE-2022-49367: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (bsc#1238447).\n- CVE-2022-49370: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (bsc#1238467).\n- CVE-2022-49372: tcp: tcp_rtx_synack() can be called from process context (bsc#1238251).\n- CVE-2022-49388: ubi: ubi_create_volume: Fix use-after-free when volume creation failed (bsc#1237934).\n- CVE-2022-49395: um: Fix out-of-bounds read in LDT setup (bsc#1237953).\n- CVE-2022-49397: phy: qcom-qmp: fix struct clk leak on probe errors (bsc#1237823).\n- CVE-2022-49404: RDMA/hfi1: Fix potential integer multiplication overflow errors (bsc#1238430).\n- CVE-2022-49416: wifi: mac80211: fix use-after-free in chanctx code (bsc#1238293).\n- CVE-2022-49433: RDMA/hfi1: Prevent use of lock before it is initialized (bsc#1238268).\n- CVE-2022-49472: net: phy: micrel: Allow probing without .driver_data (bsc#1238951).\n- CVE-2022-49488: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock (bsc#1238600).\n- CVE-2022-49495: drm/msm/hdmi: check return value after calling platform_get_resource_byname() (bsc#1237932).\n- CVE-2022-49497: net: remove two BUG() from skb_checksum_help() (bsc#1238946).\n- CVE-2022-49505: NFC: NULL out the dev->rfkill to prevent UAF (bsc#1238615).\n- CVE-2022-49516: ice: always check VF VSI pointer values (bsc#1238953).\n- CVE-2022-49519: ath10k: skip ath10k_halt during suspend for driver state RESTARTING (bsc#1238943).\n- CVE-2022-49524: media: pci: cx23885: Fix the error handling in cx23885_initdev() (bsc#1238949).\n- CVE-2022-49530: drm/amd/pm: fix double free in si_parse_power_table() (bsc#1238944).\n- CVE-2022-49538: ALSA: jack: Fix mutex call in snd_jack_report() (bsc#1238843).\n- CVE-2022-49544: ipw2x00: Fix potential NULL dereference in libipw_xmit() (bsc#1238721).\n- CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729).\n- CVE-2022-49546: x86/kexec: Fix double-free of elf header buffer (bsc#1238750).\n- CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787).\n- CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789).\n- CVE-2022-49578: ip: Fix data-races around sysctl_ip_prot_sock. (bsc#1238794).\n- CVE-2022-49581: be2net: Fix buffer overflow in be_get_module_eeprom (bsc#1238540).\n- CVE-2022-49589: kABI: protect mr_ifc_count change (bsc#1238598).\n- CVE-2022-49605: igc: Reinstate IGC_REMOVED logic and implement it properly (bsc#1238433).\n- CVE-2022-49607: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (bsc#1238817).\n- CVE-2022-49610: KVM: VMX: Prevent RSB underflow before vmenter (bsc#1238952).\n- CVE-2022-49619: net: sfp: fix memory leak in sfp_probe() (bsc#1239003).\n- CVE-2022-49620: net: tipc: fix possible refcount leak in tipc_sk_create() (bsc#1239002).\n- CVE-2022-49640: sysctl: Fix data races in proc_douintvec_minmax() (bsc#1237782).\n- CVE-2022-49641: sysctl: Fix data races in proc_douintvec() (bsc#1237831).\n- CVE-2022-49667: net: bonding: fix use-after-free after 802.3ad slave unbind (bsc#1238282).\n- CVE-2022-49672: net: tun: unlink NAPI from device on destruction (bsc#1238816).\n- CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (bsc#1238416).\n- CVE-2022-49727: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg (bsc#1239059).\n- CVE-2022-49740: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads (bsc#1240233).\n- CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).\n- CVE-2023-52997: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() (bsc#1240303).\n- CVE-2023-53010: bnxt: Do not read past the end of test names (bsc#1240290).\n- CVE-2023-53019: net: mdio: validate parameter addr in mdiobus_get_phy() (bsc#1240286).\n- CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489).\n- CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130).\n- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).\n- CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858).\n- CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733).\n- CVE-2024-49935: ACPI: PAD: fix crash in exit_round_robin() (bsc#1232370).\n- CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812).\n- CVE-2024-50269: usb: musb: sunxi: Fix accessing an released usb phy (bsc#1233458).\n- CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).\n- CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222).\n- CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715).\n- CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436).\n- CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637).\n- CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973).\n- CVE-2024-57973: rdma/cxgb4: Prevent potential integer overflow on 32bit (bsc#1238531).\n- CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).\n- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).\n- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).\n- CVE-2024-58052: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (bsc#1238986).\n- CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970)\n- CVE-2024-58072: wifi: rtlwifi: remove unused check_buddy_priv (bsc#1238964).\n- CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036).\n- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-21708: net: usb: rtl8150: enable basic endpoint checking (bsc#1239087).\n- CVE-2025-21744: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (bsc#1238903).\n- CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738).\n- CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763).\n- CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).\n- CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897).\n- CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906).\n- CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754).\n- CVE-2025-21776: USB: hub: Ignore non-compliant devices with too many configs or interfaces (bsc#1238909).\n- CVE-2025-21782: orangefs: fix a oob in orangefs_debug_write (bsc#1239117).\n- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).\n- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).\n- CVE-2025-21796: nfsd: clear acl_access/acl_default after releasing them (bsc#1238716).\n- CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).\n- CVE-2025-21821: fbdev: omap: use threaded IRQ for LCD DMA (bsc#1239174).\n- CVE-2025-21831: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (bsc#1239039).\n- CVE-2025-21846: acct: perform last write from workqueue (bsc#1239508).\n- CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479).\n- CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481).\n- CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).\n- CVE-2025-21877: usbnet: gl620a: fix endpoint checking in genelink_bind() (bsc#1240172).\n- CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186).\n- CVE-2025-21916: usb: atm: cxacru: fix a flaw in existing endpoint checks (bsc#1240582).\n- CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).\n- CVE-2025-21934: rapidio: fix an API misues when rio_add_net() fails (bsc#1240708).\n- CVE-2025-21935: rapidio: add check for rio_add_net() in rio_scan_alloc_net() (bsc#1240700).\n- CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784).\n- CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797).\n- CVE-2025-21996: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (bsc#1240801).\n- CVE-2025-22007: Bluetooth: Fix error code in chan_alloc_skb_cb() (bsc#1240582).\n\nThe following non-security bugs were fixed:\n\n- ceph: fix up error handling with snapdirs (bsc#1237836)\n- cpufreq: governor: Use kobject release() method to free dbs_data (bsc#1237800).\n- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (bsc#1238467)\n- gro_cells: Avoid packet re-ordering for cloned skbs (bsc#1226323).\n- ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).\n- ipv4: use RCU protection in inet_select_addr() (bsc#1239994).\n- ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).\n- ipv4: use RCU protection in rt_is_expired() (bsc#1239994).\n- ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).\n- ipv6: Use RCU in ip6_input() (bsc#1239994).\n- kernel/sysctl.c: define minmax conv functions in terms of non-minmax versions (bsc#1237782)\n- ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).\n- ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).\n- net: add dev_net_rcu() helper (bsc#1239994).\n- net: fix SO_REUSEPORT return code (bsc#1239448)\n- net: mana: Support holes in device list reply msg (bsc#1240133).\n- net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu() (bsc#1239994).\n- net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480).\n- pipe, sysctl: drop 'min' parameter from pipe-max-size converter (bsc#1237782)\n- pipe, sysctl: remove pipe_proc_fn() (bsc#1237782)\n- pipe: add proc_dopipe_max_size() to safely assign pipe_max_size (bsc#1237782)\n- pipe: reject F_SETPIPE_SZ with size over UINT_MAX (bsc#1237782)\n- scripts: fix incorrect regex escape With Tumbleweed's recent switch to Python 3.13 \n- sysctl: check for UINT_MAX before unsigned int min/max (bsc#1237782)\n- team: add ethtool get_link_ksettings (bsc#1228909).\n","id":"SUSE-SU-2025:1293-1","modified":"2025-04-16T07:51:20Z","published":"2025-04-16T07:51:20Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20251293-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197331"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197661"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200871"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202672"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237782"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237800"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237925"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237933"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237936"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238079"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238240"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238257"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238269"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238271"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238372"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238376"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238378"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238393"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238396"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238521"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238654"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238719"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238794"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238817"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238925"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238933"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238944"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238949"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238970"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239059"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239448"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239508"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240213"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240286"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240288"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240290"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240801"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47652"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-26373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49046"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49075"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49217"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49291"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49297"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49300"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49330"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49344"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49367"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49370"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49372"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49389"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49395"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49404"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49413"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49414"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49421"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49429"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49432"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49434"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49437"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49443"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49444"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49472"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49492"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49495"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49497"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49505"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49513"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49516"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49519"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49524"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49526"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49530"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49538"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49544"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49545"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49555"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49578"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49584"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49611"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49620"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49638"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49649"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49657"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49710"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49711"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3567"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49571"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49940"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58071"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21762"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21796"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22007"}],"related":["CVE-2017-5753","CVE-2021-46925","CVE-2021-47633","CVE-2021-47645","CVE-2021-47648","CVE-2021-47652","CVE-2022-1016","CVE-2022-1048","CVE-2022-1184","CVE-2022-26373","CVE-2022-2977","CVE-2022-3303","CVE-2022-49046","CVE-2022-49051","CVE-2022-49053","CVE-2022-49058","CVE-2022-49059","CVE-2022-49065","CVE-2022-49066","CVE-2022-49074","CVE-2022-49075","CVE-2022-49084","CVE-2022-49085","CVE-2022-49095","CVE-2022-49098","CVE-2022-49100","CVE-2022-49107","CVE-2022-49109","CVE-2022-49114","CVE-2022-49119","CVE-2022-49120","CVE-2022-49122","CVE-2022-49155","CVE-2022-49156","CVE-2022-49157","CVE-2022-49158","CVE-2022-49159","CVE-2022-49160","CVE-2022-49164","CVE-2022-49191","CVE-2022-49196","CVE-2022-49204","CVE-2022-49209","CVE-2022-49217","CVE-2022-49220","CVE-2022-49226","CVE-2022-49259","CVE-2022-49264","CVE-2022-49271","CVE-2022-49272","CVE-2022-49275","CVE-2022-49280","CVE-2022-49281","CVE-2022-49286","CVE-2022-49287","CVE-2022-49288","CVE-2022-49291","CVE-2022-49292","CVE-2022-49293","CVE-2022-49295","CVE-2022-49297","CVE-2022-49300","CVE-2022-49308","CVE-2022-49313","CVE-2022-49321","CVE-2022-49322","CVE-2022-49330","CVE-2022-49331","CVE-2022-49332","CVE-2022-49337","CVE-2022-49343","CVE-2022-49344","CVE-2022-49347","CVE-2022-49349","CVE-2022-49367","CVE-2022-49370","CVE-2022-49372","CVE-2022-49388","CVE-2022-49389","CVE-2022-49395","CVE-2022-49397","CVE-2022-49404","CVE-2022-49407","CVE-2022-49409","CVE-2022-49413","CVE-2022-49414","CVE-2022-49416","CVE-2022-49421","CVE-2022-49429","CVE-2022-49432","CVE-2022-49433","CVE-2022-49434","CVE-2022-49437","CVE-2022-49443","CVE-2022-49444","CVE-2022-49472","CVE-2022-49488","CVE-2022-49492","CVE-2022-49495","CVE-2022-49497","CVE-2022-49505","CVE-2022-49513","CVE-2022-49516","CVE-2022-49519","CVE-2022-49524","CVE-2022-49526","CVE-2022-49530","CVE-2022-49532","CVE-2022-49538","CVE-2022-49544","CVE-2022-49545","CVE-2022-49546","CVE-2022-49555","CVE-2022-49563","CVE-2022-49564","CVE-2022-49566","CVE-2022-49578","CVE-2022-49581","CVE-2022-49584","CVE-2022-49589","CVE-2022-49605","CVE-2022-49607","CVE-2022-49610","CVE-2022-49611","CVE-2022-49619","CVE-2022-49620","CVE-2022-49623","CVE-2022-49638","CVE-2022-49640","CVE-2022-49641","CVE-2022-49647","CVE-2022-49649","CVE-2022-49657","CVE-2022-49667","CVE-2022-49672","CVE-2022-49673","CVE-2022-49674","CVE-2022-49687","CVE-2022-49707","CVE-2022-49708","CVE-2022-49710","CVE-2022-49711","CVE-2022-49713","CVE-2022-49727","CVE-2022-49733","CVE-2022-49740","CVE-2023-2162","CVE-2023-3567","CVE-2023-52933","CVE-2023-52935","CVE-2023-52973","CVE-2023-52974","CVE-2023-52979","CVE-2023-52997","CVE-2023-53000","CVE-2023-53006","CVE-2023-53007","CVE-2023-53008","CVE-2023-53010","CVE-2023-53015","CVE-2023-53019","CVE-2023-53024","CVE-2023-53031","CVE-2024-35910","CVE-2024-36968","CVE-2024-38559","CVE-2024-41005","CVE-2024-47678","CVE-2024-49571","CVE-2024-49935","CVE-2024-49940","CVE-2024-50269","CVE-2024-50290","CVE-2024-53063","CVE-2024-53124","CVE-2024-53140","CVE-2024-53680","CVE-2024-56633","CVE-2024-56640","CVE-2024-56770","CVE-2024-57900","CVE-2024-57973","CVE-2024-57979","CVE-2024-57996","CVE-2024-58014","CVE-2024-58052","CVE-2024-58071","CVE-2024-58072","CVE-2024-58083","CVE-2025-21703","CVE-2025-21708","CVE-2025-21744","CVE-2025-21759","CVE-2025-21760","CVE-2025-21762","CVE-2025-21763","CVE-2025-21765","CVE-2025-21766","CVE-2025-21776","CVE-2025-21782","CVE-2025-21785","CVE-2025-21791","CVE-2025-21796","CVE-2025-21802","CVE-2025-21821","CVE-2025-21831","CVE-2025-21846","CVE-2025-21848","CVE-2025-21855","CVE-2025-21858","CVE-2025-21865","CVE-2025-21871","CVE-2025-21877","CVE-2025-21891","CVE-2025-21916","CVE-2025-21922","CVE-2025-21934","CVE-2025-21935","CVE-2025-21969","CVE-2025-21993","CVE-2025-21996","CVE-2025-22007"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2017-5753","CVE-2021-46925","CVE-2021-47633","CVE-2021-47645","CVE-2021-47648","CVE-2021-47652","CVE-2022-1016","CVE-2022-1048","CVE-2022-1184","CVE-2022-26373","CVE-2022-2977","CVE-2022-3303","CVE-2022-49046","CVE-2022-49051","CVE-2022-49053","CVE-2022-49058","CVE-2022-49059","CVE-2022-49065","CVE-2022-49066","CVE-2022-49074","CVE-2022-49075","CVE-2022-49084","CVE-2022-49085","CVE-2022-49095","CVE-2022-49098","CVE-2022-49100","CVE-2022-49107","CVE-2022-49109","CVE-2022-49114","CVE-2022-49119","CVE-2022-49120","CVE-2022-49122","CVE-2022-49155","CVE-2022-49156","CVE-2022-49157","CVE-2022-49158","CVE-2022-49159","CVE-2022-49160","CVE-2022-49164","CVE-2022-49191","CVE-2022-49196","CVE-2022-49204","CVE-2022-49209","CVE-2022-49217","CVE-2022-49220","CVE-2022-49226","CVE-2022-49259","CVE-2022-49264","CVE-2022-49271","CVE-2022-49272","CVE-2022-49275","CVE-2022-49280","CVE-2022-49281","CVE-2022-49286","CVE-2022-49287","CVE-2022-49288","CVE-2022-49291","CVE-2022-49292","CVE-2022-49293","CVE-2022-49295","CVE-2022-49297","CVE-2022-49300","CVE-2022-49308","CVE-2022-49313","CVE-2022-49321","CVE-2022-49322","CVE-2022-49330","CVE-2022-49331","CVE-2022-49332","CVE-2022-49337","CVE-2022-49343","CVE-2022-49344","CVE-2022-49347","CVE-2022-49349","CVE-2022-49367","CVE-2022-49370","CVE-2022-49372","CVE-2022-49388","CVE-2022-49389","CVE-2022-49395","CVE-2022-49397","CVE-2022-49404","CVE-2022-49407","CVE-2022-49409","CVE-2022-49413","CVE-2022-49414","CVE-2022-49416","CVE-2022-49421","CVE-2022-49429","CVE-2022-49432","CVE-2022-49433","CVE-2022-49434","CVE-2022-49437","CVE-2022-49443","CVE-2022-49444","CVE-2022-49472","CVE-2022-49488","CVE-2022-49492","CVE-2022-49495","CVE-2022-49497","CVE-2022-49505","CVE-2022-49513","CVE-2022-49516","CVE-2022-49519","CVE-2022-49524","CVE-2022-49526","CVE-2022-49530","CVE-2022-49532","CVE-2022-49538","CVE-2022-49544","CVE-2022-49545","CVE-2022-49546","CVE-2022-49555","CVE-2022-49563","CVE-2022-49564","CVE-2022-49566","CVE-2022-49578","CVE-2022-49581","CVE-2022-49584","CVE-2022-49589","CVE-2022-49605","CVE-2022-49607","CVE-2022-49610","CVE-2022-49611","CVE-2022-49619","CVE-2022-49620","CVE-2022-49623","CVE-2022-49638","CVE-2022-49640","CVE-2022-49641","CVE-2022-49647","CVE-2022-49649","CVE-2022-49657","CVE-2022-49667","CVE-2022-49672","CVE-2022-49673","CVE-2022-49674","CVE-2022-49687","CVE-2022-49707","CVE-2022-49708","CVE-2022-49710","CVE-2022-49711","CVE-2022-49713","CVE-2022-49727","CVE-2022-49733","CVE-2022-49740","CVE-2023-2162","CVE-2023-3567","CVE-2023-52933","CVE-2023-52935","CVE-2023-52973","CVE-2023-52974","CVE-2023-52979","CVE-2023-52997","CVE-2023-53000","CVE-2023-53006","CVE-2023-53007","CVE-2023-53008","CVE-2023-53010","CVE-2023-53015","CVE-2023-53019","CVE-2023-53024","CVE-2023-53031","CVE-2024-35910","CVE-2024-36968","CVE-2024-38559","CVE-2024-41005","CVE-2024-47678","CVE-2024-49571","CVE-2024-49935","CVE-2024-49940","CVE-2024-50269","CVE-2024-50290","CVE-2024-53063","CVE-2024-53124","CVE-2024-53140","CVE-2024-53680","CVE-2024-56633","CVE-2024-56640","CVE-2024-56770","CVE-2024-57900","CVE-2024-57973","CVE-2024-57979","CVE-2024-57996","CVE-2024-58014","CVE-2024-58052","CVE-2024-58071","CVE-2024-58072","CVE-2024-58083","CVE-2025-21703","CVE-2025-21708","CVE-2025-21744","CVE-2025-21759","CVE-2025-21760","CVE-2025-21762","CVE-2025-21763","CVE-2025-21765","CVE-2025-21766","CVE-2025-21776","CVE-2025-21782","CVE-2025-21785","CVE-2025-21791","CVE-2025-21796","CVE-2025-21802","CVE-2025-21821","CVE-2025-21831","CVE-2025-21846","CVE-2025-21848","CVE-2025-21855","CVE-2025-21858","CVE-2025-21865","CVE-2025-21871","CVE-2025-21877","CVE-2025-21891","CVE-2025-21916","CVE-2025-21922","CVE-2025-21934","CVE-2025-21935","CVE-2025-21969","CVE-2025-21993","CVE-2025-21996","CVE-2025-22007"]}