{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-150700_7_28-rt":"1-150700.1.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP7","name":"kernel-livepatch-SLE15-SP7-RT_Update_8","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP7-RT_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150700.1.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.28.1","dlm-kmp-rt":"6.4.0-150700.7.28.1","gfs2-kmp-rt":"6.4.0-150700.7.28.1","kernel-devel-rt":"6.4.0-150700.7.28.1","kernel-rt":"6.4.0-150700.7.28.1","kernel-rt-devel":"6.4.0-150700.7.28.1","kernel-source-rt":"6.4.0-150700.7.28.1","kernel-syms-rt":"6.4.0-150700.7.28.1","ocfs2-kmp-rt":"6.4.0-150700.7.28.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.28.1","dlm-kmp-rt":"6.4.0-150700.7.28.1","gfs2-kmp-rt":"6.4.0-150700.7.28.1","kernel-devel-rt":"6.4.0-150700.7.28.1","kernel-rt":"6.4.0-150700.7.28.1","kernel-rt-devel":"6.4.0-150700.7.28.1","kernel-source-rt":"6.4.0-150700.7.28.1","kernel-syms-rt":"6.4.0-150700.7.28.1","ocfs2-kmp-rt":"6.4.0-150700.7.28.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.28.1","dlm-kmp-rt":"6.4.0-150700.7.28.1","gfs2-kmp-rt":"6.4.0-150700.7.28.1","kernel-devel-rt":"6.4.0-150700.7.28.1","kernel-rt":"6.4.0-150700.7.28.1","kernel-rt-devel":"6.4.0-150700.7.28.1","kernel-source-rt":"6.4.0-150700.7.28.1","kernel-syms-rt":"6.4.0-150700.7.28.1","ocfs2-kmp-rt":"6.4.0-150700.7.28.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.28.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP7 RT kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).\n- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).\n- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).\n- CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647).\n- CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr update (bsc#1253623).\n- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).\n- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).\n- CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport() (bsc#1254815).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is missing (bsc#1254869).\n- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).\n- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).\n- CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq() failure (bsc#1254854).\n- CVE-2025-40251: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (bsc#1254856).\n- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849).\n- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).\n- CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param (bsc#1255082).\n- CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).\n- CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying (bsc#1254830).\n- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).\n- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).\n- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).\n- CVE-2025-40287: exfat: fix improper check of dentry.stream.valid_size (bsc#1255030).\n- CVE-2025-40289: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (bsc#1255042).\n- CVE-2025-40292: virtio-net: fix received length check in big packets (bsc#1255175).\n- CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking (bsc#1255179).\n- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).\n- CVE-2025-40307: exfat: validate cluster allocation bits of the allocation bitmap (bsc#1255039).\n- CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer (bsc#1254794).\n- CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors (bsc#1255081).\n- CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between components (bsc#1255273).\n- CVE-2025-40346: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (bsc#1255318).\n- CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump (bsc#1255097).\n- CVE-2025-68197: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() (bsc#1255242).\n- CVE-2025-68204: pmdomain: arm: scmi: Fix genpd leak on provider registration failure (bsc#1255224).\n- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).\n- CVE-2025-68208: bpf: account for current allocated stack depth in widen_imprecise_scalars() (bsc#1255227).\n- CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230).\n- CVE-2025-68239: binfmt_misc: restore write access before closing files opened by open_exec() (bsc#1255272).\n- CVE-2025-68255: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing (bsc#1255395).\n- CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).\n- CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380).\n- CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx() (bsc#1255121).\n- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).\n- CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper function (bsc#1255614).\n- CVE-2025-68742: bpf: Improve program stats run-time calculation (bsc#1255707).\n- CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps (bsc#1255709).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Fix missing PCC check for guaranteed_perf (git-fixes).\n- ACPI: PCC: Fix race condition by removing static qualifier (git-fixes).\n- ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).\n- ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes).\n- ACPI: property: Use ACPI functions in acpi_graph_get_next_endpoint() only (stable-fixes).\n- ACPICA: Avoid walking the Namespace if start_node is NULL (stable-fixes).\n- ALSA: ac97: fix a double free in snd_ac97_controller_register() (git-fixes).\n- ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).\n- ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-fixes).\n- ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-fixes).\n- ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes).\n- ALSA: pcmcia: Fix resource leak in snd_pdacf_probe error path (git-fixes).\n- ALSA: uapi: Fix typo in asound.h comment (git-fixes).\n- ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).\n- ALSA: usb-audio: Add native DSD quirks for PureAudio DAC series (stable-fixes).\n- ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).\n- ALSA: usb-mixer: us16x08: validate meter packet indices (git-fixes).\n- ALSA: vxpocket: Fix resource leak in vxpocket_probe error path (git-fixes).\n- ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).\n- ASoC: ak4458: Disable regulator when error happens (git-fixes).\n- ASoC: ak4458: remove the reset operation in probe and remove (git-fixes).\n- ASoC: ak5558: Disable regulator when error happens (git-fixes).\n- ASoC: bcm: bcm63xx-pcm-whistler: Check return value of of_dma_configure() (git-fixes).\n- ASoC: codecs: lpass-tx-macro: fix SM6115 support (git-fixes).\n- ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).\n- ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).\n- ASoC: qcom: q6adm: the the copp device only during last instance (git-fixes).\n- ASoC: qcom: q6apm-dai: set flags to reflect correct operation of appl_ptr (git-fixes).\n- ASoC: qcom: q6asm-dai: perform correct state check before closing (git-fixes).\n- ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-fixes).\n- ASoC: stm32: sai: fix OF node leak on probe (git-fixes).\n- ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).\n- ASoC: stm32: sai: fix device leak on probe (git-fixes).\n- ASoC: sun4i-spdif: Add missing kerneldoc fields for sun4i_spdif_quirks (git-fixes).\n- Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).\n- Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete (git-fixes).\n- Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-fixes).\n- Bluetooth: btrtl: Avoid loading the config file on security chips (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID 13d3/3533 for RTL8821CE (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID 2b89/6275 for RTL8761BUV (stable-fixes).\n- Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref (git-fixes).\n- Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface (git-fixes).\n- Bluetooth: btusb: revert use of devm_kzalloc in btusb (git-fixes).\n- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-fixes).\n- Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes).\n- Documentation: hid-alps: Fix packet format section headings (git-fixes).\n- Documentation: parport-lowlevel: Separate function listing code blocks (git-fixes).\n- HID: apple: Add SONiX AK870 PRO to non_apple_keyboards quirk list (stable-fixes).\n- HID: elecom: Add support for ELECOM M-XT3URBK (018F) (stable-fixes).\n- HID: hid-input: Extend Elan ignore battery quirk to USB (stable-fixes).\n- HID: input: map HID_GD_Z to ABS_DISTANCE for stylus/pen (stable-fixes).\n- HID: logitech-dj: Remove duplicate error logging (git-fixes).\n- HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-fixes).\n- HID: quirks: work around VID/PID conflict for appledisplay (git-fixes).\n- Input: atkbd - skip deactivate for HONOR FMB-P's internal keyboard (git-fixes).\n- Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).\n- Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).\n- Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).\n- Input: i8042 - add TUXEDO InfinityBook Max Gen10 AMD to i8042 quirk table (stable-fixes).\n- Input: ti_am335x_tsc - fix off-by-one error in wire_order validation (git-fixes).\n- KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).\n- KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).\n- KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255463).\n- PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-fixes).\n- PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).\n- PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).\n- PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).\n- PM: runtime: Do not clear needs_force_resume with enabled runtime PM (git-fixes).\n- Revert 'drm/amd/display: Fix pbn to kbps Conversion' (stable-fixes).\n- Revert 'drm/amd/display: Move setup_stream_attribute' (stable-fixes).\n- Revert 'drm/amd: Skip power ungate during suspend for VPE' (git-fixes).\n- Revert 'mtd: rawnand: marvell: fix layouts' (git-fixes).\n- Revert 'net: r8169: Disable multicast filter for RTL8168H and RTL8107E' (jsc#PED-14353).\n- Revert 'r8169: don't try to disable interrupts if NAPI is, scheduled already' (jsc#PED-14353).\n- USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes).\n- USB: lpc32xx_udc: Fix error handling in probe (git-fixes).\n- USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).\n- USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).\n- USB: serial: ftdi_sio: match on interface number for jtag (stable-fixes).\n- USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).\n- USB: serial: option: add Foxconn T99W760 (stable-fixes).\n- USB: serial: option: add Quectel RG255C (stable-fixes).\n- USB: serial: option: add Telit Cinterion FE910C04 new compositions (stable-fixes).\n- USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).\n- USB: serial: option: add UNISOC UIS7720 (stable-fixes).\n- USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).\n- USB: serial: option: move Telit 0x10c7 composition in the right place (stable-fixes).\n- USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes).\n- accel/ivpu: Fix DCT active percent format (git-fixes).\n- accel/ivpu: Fix race condition when unbinding BOs (git-fixes).\n- arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes).\n- arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes).\n- atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).\n- atm: Fix dma_free_coherent() size (git-fixes).\n- atm: idt77252: Add missing `dma_map_error()` (stable-fixes).\n- backlight: led-bl: Add devlink to supplier LEDs (git-fixes).\n- backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).\n- bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433).\n- bpf: Reject bpf_timer for PREEMPT_RT (git-fixes).\n- broadcom: b44: prevent uninitialized value usage (git-fixes).\n- btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes).\n- can: gs_usb: gs_can_open(): fix error handling (git-fixes).\n- can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes).\n- can: j1939: make j1939_sk_bind() fail if device is no longer registered (git-fixes).\n- can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-fixes).\n- can: sja1000: fix max irq loop handling (git-fixes).\n- can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-fixes).\n- cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434).\n- char: applicom: fix NULL pointer dereference in ac_ioctl (stable-fixes).\n- cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).\n- clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).\n- clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes).\n- clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes).\n- clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).\n- clk: samsung: exynos-clkout: Assign .num before accessing .hws (git-fixes).\n- comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).\n- comedi: check device's attached status in compat ioctls (git-fixes).\n- comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).\n- comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).\n- cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-fixes).\n- cpufreq: nforce2: fix reference count leak in nforce2 (git-fixes).\n- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).\n- crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes).\n- crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-fixes).\n- crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).\n- crypto: hisilicon/qm - restore original qos values (git-fixes).\n- crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).\n- crypto: qat - fix duplicate restarting msg during AER error (git-fixes).\n- crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-fixes).\n- crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (git-fixes).\n- dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).\n- dm-verity: fix unreliable memory allocation (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386).\n- drivers/usb/dwc3: fix PCI parent check (git-fixes).\n- drm/amd/amdgpu: reserve vm invalidation engine for uni_mes (stable-fixes).\n- drm/amd/display: Check NULL before accessing (stable-fixes).\n- drm/amd/display: Clear the CUR_ENABLE register on DCN20 on DPP5 (stable-fixes).\n- drm/amd/display: Don't change brightness for disabled connectors (stable-fixes).\n- drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes).\n- drm/amd/display: Fix pbn to kbps Conversion (stable-fixes).\n- drm/amd/display: Fix scratch registers offsets for DCN35 (stable-fixes).\n- drm/amd/display: Fix scratch registers offsets for DCN351 (stable-fixes).\n- drm/amd/display: Increase DPCD read retries (stable-fixes).\n- drm/amd/display: Insert dccg log for easy debug (stable-fixes).\n- drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-fixes).\n- drm/amd/display: Prevent Gating DTBCLK before It Is Properly Latched (git-fixes).\n- drm/amd/display: Use GFP_ATOMIC in dc_create_plane_state() (stable-fixes).\n- drm/amd/display: avoid reset DTBCLK at clock init (stable-fixes).\n- drm/amd/display: disable DPP RCG before DPP CLK enable (stable-fixes).\n- drm/amd: Skip power ungate during suspend for VPE (stable-fixes).\n- drm/amdgpu/gmc11: add amdgpu_vm_handle_fault() handling (stable-fixes).\n- drm/amdgpu/gmc12: add amdgpu_vm_handle_fault() handling (stable-fixes).\n- drm/amdgpu: Forward VMID reservation errors (git-fixes).\n- drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-fixes).\n- drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).\n- drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).\n- drm/amdgpu: fix gpu page fault after hibernation on PF passthrough (stable-fixes).\n- drm/amdkfd: Export the cwsr_size and ctl_stack_size to userspace (stable-fixes).\n- drm/amdkfd: Fix GPU mappings for APU after prefetch (stable-fixes).\n- drm/amdkfd: Trap handler support for expert scheduling mode (stable-fixes).\n- drm/amdkfd: Use huge page size to check split svm range alignment (git-fixes).\n- drm/amdkfd: bump minimum vgpr size for gfx1151 (stable-fixes).\n- drm/displayid: add quirk to ignore DisplayID checksum errors (stable-fixes).\n- drm/displayid: pass iter to drm_find_displayid_extension() (stable-fixes).\n- drm/edid: add DRM_EDID_IDENT_INIT() to initialize struct drm_edid_ident (stable-fixes).\n- drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).\n- drm/i915/dp: Initialize the source OUI write timestamp always (stable-fixes).\n- drm/i915/dp_mst: Disable Panel Replay (git-fixes).\n- drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer (git-fixes).\n- drm/i915: Fix format string truncation warning (git-fixes).\n- drm/imagination: Disallow exporting of PM/FW protected objects (git-fixes).\n- drm/imagination: Fix reference to devm_platform_get_and_ioremap_resource() (git-fixes).\n- drm/me/gsc: mei interrupt top half should be in irq disabled context (git-fixes).\n- drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).\n- drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-fixes).\n- drm/mediatek: Fix probe device leaks (git-fixes).\n- drm/mediatek: Fix probe memory leak (git-fixes).\n- drm/mediatek: Fix probe resource leaks (git-fixes).\n- drm/mediatek: ovl_adaptor: Fix probe device leaks (git-fixes).\n- drm/mgag200: Fix big-endian support (git-fixes).\n- drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).\n- drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-fixes).\n- drm/msm/a6xx: Fix the gemnoc workaround (git-fixes).\n- drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).\n- drm/msm/a6xx: Improve MX rail fallback in RPMH vote init (git-fixes).\n- drm/msm/dpu: Add missing NULL pointer check for pingpong interface (git-fixes).\n- drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-fixes).\n- drm/msm/dpu: drop dpu_hw_dsc_destroy() prototype (git-fixes).\n- drm/nouveau/dispnv50: Don't call drm_atomic_get_crtc_state() in prepare_fb (git-fixes).\n- drm/nouveau: refactor deprecated strcpy (git-fixes).\n- drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).\n- drm/panel: sony-td4353-jdi: Enable prepare_prev_first (git-fixes).\n- drm/panel: visionox-rm69299: Don't clear all mode flags (git-fixes).\n- drm/panthor: Avoid adding of kernel BOs to extobj list (git-fixes).\n- drm/panthor: Fix UAF on kernel BO VA nodes (git-fixes).\n- drm/panthor: Fix group_free_queue() for partially initialized queues (git-fixes).\n- drm/panthor: Fix potential memleak of vma structure (git-fixes).\n- drm/panthor: Fix race with suspend during unplug (git-fixes).\n- drm/panthor: Flush shmem writes before mapping buffers CPU-uncached (git-fixes).\n- drm/panthor: Handle errors returned by drm_sched_entity_init() (git-fixes).\n- drm/pl111: Fix error handling in pl111_amba_probe (git-fixes).\n- drm/plane: Fix IS_ERR() vs NULL check in drm_plane_create_hotspot_properties() (git-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- drm/sched: Fix race in drm_sched_entity_select_rq() (git-fixes).\n- drm/tilcdc: Fix removal actions in case of failed probe (git-fixes).\n- drm/tilcdc: request and mapp iomem with devres (stable-fixes).\n- drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).\n- drm/vgem-fence: Fix potential deadlock on release (git-fixes).\n- drm/vmwgfx: Use kref in vmw_bo_dirty (stable-fixes).\n- drm/xe/bo: Don't include the CCS metadata in the dma-buf sg-table (git-fixes).\n- drm/xe/oa: Disallow 0 OA property values (git-fixes).\n- drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl() (git-fixes).\n- drm/xe/oa: Limit num_syncs to prevent oversized allocations (git-fixes).\n- drm/xe: Adjust long-running workload timeslices to reasonable values (git-fixes).\n- drm/xe: Drop preempt-fences when destroying imported dma-bufs (git-fixes).\n- drm/xe: Fix conversion from clock ticks to milliseconds (git-fixes).\n- drm/xe: Limit num_syncs to prevent oversized allocations (git-fixes).\n- drm/xe: Prevent BIT() overflow when handling invalid prefetch region (git-fixes).\n- drm/xe: Restore engine registers before restarting schedulers after GT reset (git-fixes).\n- drm/xe: Use usleep_range for accurate long-running workload timeslicing (git-fixes).\n- drm: atmel-hlcdc: fix atmel_xlcdc_plane_setup_scaler() (git-fixes).\n- drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).\n- drm: sti: fix device leaks at component probe (git-fixes).\n- efi/libstub: Avoid physical address 0x0 when doing random allocation (stable-fixes).\n- efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-fixes).\n- efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes).\n- efi: stmm: Fix incorrect buffer allocation method (git-fixes).\n- efi: stmm: fix kernel-doc 'bad line' warnings (git-fixes).\n- exfat: add a check for invalid data size (git-fixes).\n- exfat: using hweight instead of internal logic (git-fixes).\n- ext4: use optimized mballoc scanning regardless of inode format (bsc#1254378).\n- ext4: wait for ongoing I/O to complete before freeing blocks (bsc#1256366).\n- fbdev: gbefb: fix to use physical address instead of dma address (stable-fixes).\n- fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-fixes).\n- fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).\n- fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).\n- firewire: nosy: Fix dma_free_coherent() size (git-fixes).\n- firmware: imx: scu-irq: Init workqueue before request mbox channel (stable-fixes).\n- firmware: imx: scu-irq: fix OF node leak in (git-fixes).\n- firmware: stratix10-svc: Add mutex in stratix10 memory management (git-fixes).\n- firmware: stratix10-svc: fix bug in saving controller data (git-fixes).\n- firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-fixes).\n- fs: dlm: allow to F_SETLKW getting interrupted (bsc#1255025).\n- ftrace: bpf: Fix IPMODIFY + DIRECT in modify_ftrace_direct() (git-fixes).\n- genalloc.h: fix htmldocs warning (git-fixes).\n- gpio: rockchip: mark the GPIO controller as sleeping (git-fixes).\n- gpu: host1x: Fix race in syncpt alloc/free (git-fixes).\n- hwmon: (ibmpex) fix use-after-free in high/low store (git-fixes).\n- hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).\n- hwmon: (tmp401) fix overflow caused by default conversion rate value (git-fixes).\n- hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).\n- hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).\n- hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-fixes).\n- i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).\n- i2c: designware: Disable SMBus interrupts to prevent storms from mis-configured firmware (stable-fixes).\n- i2c: i2c.h: fix a bad kernel-doc line (git-fixes).\n- i3c: fix refcount inconsistency in i3c_master_register (git-fixes).\n- i3c: master: Inherit DMA masks and parameters from parent device (stable-fixes).\n- i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).\n- idr: fix idr_alloc() returning an ID out of range (git-fixes).\n- iio: accel: bmc150: Fix irq assumption regression (stable-fixes).\n- iio: accel: fix ADXL355 startup race condition (git-fixes).\n- iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).\n- iio: adc: ti_am335x_adc: Limit step_avg to valid range for gcc complains (stable-fixes).\n- iio: core: Clean up device correctly on iio_device_alloc() failure (git-fixes).\n- iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).\n- iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-fixes).\n- iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-fixes).\n- iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).\n- ima: Handle error code returned by ima_filter_rule_match() (git-fixes).\n- intel_th: Fix error handling in intel_th_output_open (git-fixes).\n- ipmi: Fix __scan_channels() failing to rescan channels (stable-fixes).\n- ipmi: Fix handling of messages with provided receive message pointer (git-fixes).\n- ipmi: Fix the race between __scan_channels() and deliver_response() (stable-fixes).\n- ipmi: Rework user message limit handling (git-fixes).\n- irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).\n- kconfig/mconf: Initialize the default locale at startup (stable-fixes).\n- kconfig/nconf: Initialize the default locale at startup (stable-fixes).\n- leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).\n- leds: leds-lp50xx: Enable chip before any communication (git-fixes).\n- leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-fixes).\n- leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).\n- lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-fixes).\n- mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).\n- media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).\n- media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes).\n- media: amphion: Add a frame flush mode for decoder (stable-fixes).\n- media: amphion: Cancel message work before releasing the VPU core (git-fixes).\n- media: amphion: Make some vpu_v4l2 functions static (stable-fixes).\n- media: amphion: Remove vpu_vb_is_codecconfig (git-fixes).\n- media: atomisp: Prefix firmware paths with 'intel/ipu/' (bsc#1252973).\n- media: atomisp: Remove firmware_name module parameter (bsc#1252973).\n- media: cec: Fix debugfs leak on bus_register() failure (git-fixes).\n- media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).\n- media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-fixes).\n- media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-fixes).\n- media: imx-mipi-csis: Drop extra clock enable at probe() (git-fixes).\n- media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes).\n- media: nxp: imx8-isi: Mark all crossbar sink pads as MUST_CONNECT (stable-fixes).\n- media: ov5640: fix vblank unchange issue when work at dvp mode (git-fixes).\n- media: pci: ivtv: Don't create fake v4l2_fh (stable-fixes).\n- media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).\n- media: qcom: camss: Fix genpd cleanup (git-fixes).\n- media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).\n- media: qcom: camss: cleanup media device allocated resource on error path (git-fixes).\n- media: qcom: venus: fix incorrect return value (stable-fixes).\n- media: radio-isa: use dev_name to fill in bus_info (stable-fixes).\n- media: rc: st_rc: Fix reset control resource leak (git-fixes).\n- media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes).\n- media: s5p-mfc: Fix potential deadlock on condlock (stable-fixes).\n- media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).\n- media: uvcvideo: Force UVC version to 1.0a for 0408:4033 (stable-fixes).\n- media: v4l2-mem2mem: Fix outdated documentation (git-fixes).\n- media: verisilicon: Fix CPU stalls on G2 bus error (git-fixes).\n- media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-fixes).\n- media: verisilicon: Store chroma and motion vectors offset (stable-fixes).\n- media: verisilicon: g2: Use common helpers to compute chroma and mv offsets (stable-fixes).\n- media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-fixes).\n- media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes).\n- media: vpif_capture: fix section mismatch (git-fixes).\n- media: vpif_display: fix section mismatch (git-fixes).\n- mei: gsc: add dependency on Xe driver (git-fixes).\n- mei: me: add wildcat lake P DID (stable-fixes).\n- mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).\n- mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).\n- mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes).\n- mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).\n- mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).\n- mmc: sdhci-esdhc-imx: add alternate ARCH_S32 dependency to Kconfig (git-fixes).\n- mmc: sdhci-msm: Avoid early clock doubling during HS400 transition (stable-fixes).\n- most: usb: fix double free on late probe failure (git-fixes).\n- mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).\n- mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).\n- mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-fixes).\n- mtd: nand: relax ECC parameter validation check (git-fixes).\n- mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes).\n- mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).\n- net: mdio: aspeed: add dummy read to avoid read-after-write issue (git-fixes).\n- net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write (git-fixes).\n- net: phy: adin1100: Fix software power-down ready condition (git-fixes).\n- net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-fixes).\n- net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-fixes).\n- net: r8169: Disable multicast filter for RTL8168H and RTL8107E (jsc#PED-14353).\n- net: rose: fix invalid array index in rose_kill_by_device() (git-fixes).\n- net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes).\n- net: usb: rtl8150: fix memory leak on usb_submit_urb() failure (git-fixes).\n- net: usb: sr9700: fix incorrect command used to write single register (git-fixes).\n- net: wwan: iosm: Fix memory leak in ipc_mux_deinit() (git-fixes).\n- netdevsim: print human readable IP address (bsc#1255071).\n- nfc: pn533: Fix error code in pn533_acr122_poweron_rdr() (git-fixes).\n- nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223).\n- nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).\n- nvme: Use non zero KATO for persistent discovery connections (git-fixes).\n- orangefs: fix xattr related buffer overflow.. (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- perf/x86/intel: Fix KASAN global-out-of-bounds warning (git-fixes).\n- phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).\n- phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes).\n- pinctrl: qcom: lpass-lpi: mark the GPIO controller as sleeping (git-fixes).\n- pinctrl: qcom: msm: Fix deadlock in pinmux configuration (stable-fixes).\n- pinctrl: single: Fix PIN_CONFIG_BIAS_DISABLE handling (stable-fixes).\n- pinctrl: single: Fix incorrect type for error return variable (git-fixes).\n- pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).\n- platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).\n- platform/mellanox: mlxbf-pmc: Remove trailing whitespaces from event names (git-fixes).\n- platform/x86/amd/pmc: Add spurious_8042 to Xbox Ally (stable-fixes).\n- platform/x86/amd: pmc: Add Lenovo Legion Go 2 to pmc quirk list (stable-fixes).\n- platform/x86/intel/hid: Add Dell Pro Rugged 10/12 tablet to VGBS DMI quirks (stable-fixes).\n- platform/x86: acer-wmi: Ignore backlight event (stable-fixes).\n- platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-fixes).\n- platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing (git-fixes).\n- platform/x86: huawei-wmi: add keys for HONOR models (stable-fixes).\n- platform/x86: ibm_rtl: fix EBDA signature search pointer arithmetic (git-fixes).\n- platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git-fixes).\n- platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).\n- platform/x86: msi-laptop: add missing sysfs_remove_group() (git-fixes).\n- power: supply: apm_power: only unset own apm_get_power_status (git-fixes).\n- power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes).\n- power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes).\n- power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes).\n- power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).\n- powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187).\n- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029).\n- powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493 bsc#1254244 ltc#216496).\n- pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-fixes).\n- r8169: Fix spelling mistake: 'tx_underun' -> 'tx_underrun' (jsc#PED-14353).\n- r8169: Use PCI_IRQ_INTX instead of PCI_IRQ_LEGACY (jsc#PED-14353).\n- r8169: add MODULE_FIRMWARE entry for RTL8126A (jsc#PED-14353).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add generic rtl_set_eee_txidle_timer function (jsc#PED-14353).\n- r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: add support for RTL8126A rev.b (jsc#PED-14353).\n- r8169: add support for RTL8168M (jsc#PED-14353).\n- r8169: add support for returning tx_lpi_timer in ethtool get_eee (jsc#PED-14353).\n- r8169: add support for the temperature sensor being available from RTL8125B (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: avoid unsolicited interrupts (jsc#PED-14353).\n- r8169: check for PCI read error in probe (jsc#PED-14353).\n- r8169: disable ALDPS per default for RTL8125 (jsc#PED-14353).\n- r8169: disable RTL8126 ZRX-DC timeout (jsc#PED-14353).\n- r8169: disable interrupt source RxOverflow (jsc#PED-14353).\n- r8169: don't apply UDP padding quirk on RTL8126A (jsc#PED-14353).\n- r8169: don't increment tx_dropped in case of NETDEV_TX_BUSY (jsc#PED-14353).\n- r8169: don't scan PHY addresses > 0 (jsc#PED-14353).\n- r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix RTL8117 Wake-on-Lan in DASH mode (git-fixes).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve RTL8411b phy-down fixup (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve handling task scheduling (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove detection of chip version 11 (early RTL8168b) (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove multicast filter limit (jsc#PED-14353).\n- r8169: remove not needed check in rtl_fw_write_firmware (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove redundant hwmon support (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: set EEE speed down ratio to 1 (stable-fixes).\n- r8169: simplify EEE handling (jsc#PED-14353).\n- r8169: simplify code by using core-provided pcpu stats allocation (jsc#PED-14353).\n- r8169: support setting the EEE tx idle timer on RTL8168h (jsc#PED-14353).\n- r8169: use dev_err_probe in all appropriate places in rtl_init_one() (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes).\n- regulator: core: disable supply if enabling main regulator fails (git-fixes).\n- reset: fix BIT macro reference (stable-fixes).\n- rpmsg: glink: fix rpmsg device leak (git-fixes).\n- rtc: gamecube: Check the return value of ioremap() (git-fixes).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251752 jsc#PED-14280).\n- scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251752 jsc#PED-14280).\n- scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251752 jsc#PED-14280).\n- scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251752 jsc#PED-14280).\n- scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251752 jsc#PED-14280).\n- scsi: mpi3mr: Update driver version to 8.14.0.5.50 (bsc#1251752 jsc#PED-14280).\n- scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251752 jsc#PED-14280).\n- selftests/bpf: Skip timer cases when bpf_timer is not supported (git-fixes).\n- selftests/net: calibrate txtimestamp (bsc#1255085).\n- selftests/net: convert fcnal-test.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert fib-onlink-tests.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert fib_nexthop_multiprefix to run it in unique namespace (bsc#1254235).\n- selftests/net: convert fib_nexthop_nongw.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert fib_nexthops.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert fib_rule_tests.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert fib_tests.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert srv6_end_dt46_l3vpn_test.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert srv6_end_dt4_l3vpn_test.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert srv6_end_dt6_l3vpn_test.sh to run it in unique namespace (bsc#1254235).\n- selftests/net: convert test_vxlan_vnifiltering.sh to run it in unique namespace (bsc#1255349).\n- selftests/net: convert vrf_route_leaking.sh to run it in unique namespace (bsc#1255349).\n- selftests/net: synchronize udpgro tests' tx and rx connection (bsc#1254235).\n- selftests: Introduce Makefile variable to list shared bash scripts (bsc#1254235).\n- selftests: bonding: Add net/forwarding/lib.sh to TEST_INCLUDES (bsc#1254235).\n- selftests: dsa: Replace test symlinks by wrapper script (bsc#1254235).\n- selftests: net: Remove executable bits from library scripts (bsc#1254235).\n- selftests: net: explicitly wait for listener ready (bsc#1254235).\n- selftests: net: fib-onlink-tests: Set high metric for default IPv6 route (bsc#1255346).\n- selftests: net: include forwarding lib (bsc#1254235).\n- selftests: net: included needed helper in the install targets (bsc#1254235).\n- selftests: net: more strict check in net_helper (bsc#1254235).\n- selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349).\n- selftests: net: use slowwait to stabilize vrf_route_leaking test (bsc#1255349).\n- selftests: net: veth: test the ability to independently manipulate GRO and XDP (bsc#1255101).\n- selftests: team: Add shared library scripts to TEST_INCLUDES (bsc#1254235).\n- selftests: vrf_route_leaking: remove ipv6_ping_frag from default testing (bsc#1255349).\n- serial: add support of CPCI cards (stable-fixes).\n- serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes).\n- serial: core: Fix serial device initialization (git-fixes).\n- serial: core: Restore sysfs fwnode information (git-fixes).\n- serial: sprd: Return -EPROBE_DEFER when uart clock is not ready (stable-fixes).\n- slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-fixes).\n- smc91x: fix broken irq-context in PREEMPT_RT (git-fixes).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- soc: amlogic: canvas: fix device leak on lookup (git-fixes).\n- soc: qcom: ocmem: fix device leak on lookup (git-fixes).\n- soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-fixes).\n- spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).\n- spi: bcm63xx: drop wrong casts in probe() (git-fixes).\n- spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-fixes).\n- spi: fsl-cpm: Check length parity before switching to 16 bit mode (git-fixes).\n- spi: imx: keep dma request disabled before dma transfer setup (stable-fixes).\n- spi: tegra210-qspi: Remove cache operations (git-fixes).\n- spi: tegra210-quad: Add support for internal DMA (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155).\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155).\n- spi: tegra210-quad: Fix timeout handling (git-fixes).\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155).\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes).\n- spi: xilinx: increase number of retries before declaring stall (stable-fixes).\n- staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes).\n- staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing (stable-fixes).\n- staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser (stable-fixes).\n- thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).\n- tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477).\n- tracing: Fix access to trace_event_file (bsc#1254373).\n- uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes).\n- usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).\n- usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).\n- usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).\n- usb: dwc2: disable platform lowlevel hw resources during shutdown (stable-fixes).\n- usb: dwc2: fix hang during shutdown if set as peripheral (git-fixes).\n- usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).\n- usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).\n- usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes).\n- usb: dwc3: keep susphy enabled during exit to avoid controller faults (git-fixes).\n- usb: dwc3: of-simple: fix clock resource leak in dwc3_of_simple_probe (git-fixes).\n- usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).\n- usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).\n- usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).\n- usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).\n- usb: gadget: lpc32xx_udc: fix clock imbalance in error path (git-fixes).\n- usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-fixes).\n- usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes).\n- usb: ohci-nxp: Use helper function devm_clk_get_enabled() (stable-fixes).\n- usb: ohci-nxp: fix device leak on probe failure (git-fixes).\n- usb: phy: Initialize struct usb_phy list_head (git-fixes).\n- usb: phy: isp1301: fix non-OF device reference imbalance (git-fixes).\n- usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).\n- usb: raw-gadget: do not limit transfer length (git-fixes).\n- usb: renesas_usbhs: Fix a resource leak in usbhs_pipe_malloc() (git-fixes).\n- usb: storage: Fix memory leak in USB bulk transport (git-fixes).\n- usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).\n- usb: typec: tipd: Clear interrupts first (git-fixes).\n- usb: typec: ucsi: Handle incorrect num_connectors capability (stable-fixes).\n- usb: typec: ucsi: psy: Set max current to zero when disconnected (git-fixes).\n- usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes).\n- usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).\n- usb: usb-storage: Maintain minimal modifications to the bcdDevice range (git-fixes).\n- usb: usb-storage: No additional quirks need to be added to the EL-R12 optical drive (stable-fixes).\n- usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).\n- usb: xhci: limit run_graceperiod for only usb 3.0 devices (stable-fixes).\n- usbip: Fix locking bug in RT-enabled kernels (stable-fixes).\n- via_wdt: fix critical boot hang due to unnamed resource allocation (stable-fixes).\n- virtio_console: fix order of fields cols and rows (stable-fixes).\n- watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).\n- wifi: ath10k: Add missing include of export.h (stable-fixes).\n- wifi: ath10k: Avoid vdev delete timeout when firmware is already down (stable-fixes).\n- wifi: ath10k: move recovery check logic into a new work (git-fixes).\n- wifi: ath11k: fix peer HE MCS assignment (git-fixes).\n- wifi: ath11k: restore register window after global reset (git-fixes).\n- wifi: ath12k: fix potential memory leak in ath12k_wow_arp_ns_offload() (git-fixes).\n- wifi: avoid kernel-infoleak from struct iw_point (git-fixes).\n- wifi: brcmfmac: Add DMI nvram filename quirk for Acer A1 840 tablet (stable-fixes).\n- wifi: cfg80211: sme: store capped length in __cfg80211_connect_result() (git-fixes).\n- wifi: cfg80211: stop radar detection in cfg80211_leave() (stable-fixes).\n- wifi: cfg80211: use cfg80211_leave() in iftype change (stable-fixes).\n- wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-fixes).\n- wifi: ieee80211: correct FILS status codes (git-fixes).\n- wifi: mac80211: do not use old MBSSID elements (git-fixes).\n- wifi: mac80211: fix CMAC functions not handling errors (git-fixes).\n- wifi: mac80211: restore non-chanctx injection behaviour (git-fixes).\n- wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (stable-fixes).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (stable-fixes).\n- wifi: mt76: mt792x: fix wifi init fail by setting MCU_RUNNING after CLC load (stable-fixes).\n- wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-fixes).\n- wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-fixes).\n- wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes).\n- wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() (git-fixes).\n- wifi: rtw88: Add USB ID 2001:3329 for D-Link AC13U rev. A1 (stable-fixes).\n- wifi: rtw88: limit indirect IO under powered off for RTL8822CS (git-fixes).\n- x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-fixes).\n- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).\n- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).\n- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).\n- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).\n- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).\n- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528).\n- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).\n- x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).\n- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).\n- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).\n- x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).\n- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).\n- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).\n- xhci: dbgtty: fix device unregister (git-fixes).\n- xhci: fix stale flag preventig URBs after link state error is cleared (git-fixes).\n","id":"SUSE-SU-2026:0278-1","modified":"2026-01-23T15:08:32Z","published":"2026-01-23T15:08:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260278-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246328"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253365"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253408"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253674"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254235"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254363"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254378"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254477"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254606"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254648"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254661"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254690"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254693"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254695"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254753"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254765"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254782"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254791"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254793"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254794"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255026"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255064"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255116"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255121"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255124"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255131"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255234"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255259"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255281"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255297"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255380"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255415"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255563"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255579"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255601"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255603"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255760"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255775"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255793"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255800"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255915"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255925"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255944"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255949"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255955"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255974"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255993"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256106"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256121"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256234"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256263"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256267"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256271"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256291"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256302"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256368"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256369"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256379"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256396"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256528"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-42752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53762"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53795"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53799"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53843"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53844"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53847"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53994"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54037"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54137"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54169"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54172"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54241"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54247"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54251"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54253"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54263"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54266"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54267"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54276"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54291"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54297"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54299"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54300"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54316"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54326"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40123"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40190"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40242"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40248"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40250"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40251"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40256"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40262"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40263"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40268"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40273"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40276"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40294"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40297"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40306"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40316"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40317"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40329"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40330"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40338"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40339"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40342"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40346"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68172"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68190"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68217"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68298"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68306"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68328"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68330"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68335"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68339"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68346"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68380"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68734"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68766"}],"related":["CVE-2023-42752","CVE-2023-53743","CVE-2023-53750","CVE-2023-53752","CVE-2023-53759","CVE-2023-53762","CVE-2023-53766","CVE-2023-53768","CVE-2023-53777","CVE-2023-53778","CVE-2023-53782","CVE-2023-53784","CVE-2023-53785","CVE-2023-53787","CVE-2023-53791","CVE-2023-53792","CVE-2023-53793","CVE-2023-53794","CVE-2023-53795","CVE-2023-53797","CVE-2023-53799","CVE-2023-53807","CVE-2023-53808","CVE-2023-53813","CVE-2023-53815","CVE-2023-53819","CVE-2023-53821","CVE-2023-53823","CVE-2023-53825","CVE-2023-53828","CVE-2023-53831","CVE-2023-53834","CVE-2023-53836","CVE-2023-53839","CVE-2023-53841","CVE-2023-53842","CVE-2023-53843","CVE-2023-53844","CVE-2023-53846","CVE-2023-53847","CVE-2023-53848","CVE-2023-53850","CVE-2023-53851","CVE-2023-53852","CVE-2023-53855","CVE-2023-53856","CVE-2023-53857","CVE-2023-53858","CVE-2023-53860","CVE-2023-53861","CVE-2023-53863","CVE-2023-53864","CVE-2023-53865","CVE-2023-53989","CVE-2023-53992","CVE-2023-53994","CVE-2023-53995","CVE-2023-53996","CVE-2023-53997","CVE-2023-53998","CVE-2023-53999","CVE-2023-54000","CVE-2023-54001","CVE-2023-54005","CVE-2023-54006","CVE-2023-54008","CVE-2023-54014","CVE-2023-54016","CVE-2023-54017","CVE-2023-54019","CVE-2023-54022","CVE-2023-54023","CVE-2023-54025","CVE-2023-54026","CVE-2023-54027","CVE-2023-54030","CVE-2023-54031","CVE-2023-54032","CVE-2023-54035","CVE-2023-54037","CVE-2023-54038","CVE-2023-54042","CVE-2023-54045","CVE-2023-54048","CVE-2023-54049","CVE-2023-54051","CVE-2023-54052","CVE-2023-54060","CVE-2023-54064","CVE-2023-54066","CVE-2023-54067","CVE-2023-54069","CVE-2023-54070","CVE-2023-54072","CVE-2023-54076","CVE-2023-54080","CVE-2023-54081","CVE-2023-54083","CVE-2023-54088","CVE-2023-54089","CVE-2023-54091","CVE-2023-54092","CVE-2023-54093","CVE-2023-54094","CVE-2023-54095","CVE-2023-54096","CVE-2023-54099","CVE-2023-54101","CVE-2023-54104","CVE-2023-54106","CVE-2023-54112","CVE-2023-54113","CVE-2023-54115","CVE-2023-54117","CVE-2023-54121","CVE-2023-54125","CVE-2023-54127","CVE-2023-54133","CVE-2023-54134","CVE-2023-54135","CVE-2023-54136","CVE-2023-54137","CVE-2023-54140","CVE-2023-54141","CVE-2023-54142","CVE-2023-54143","CVE-2023-54145","CVE-2023-54148","CVE-2023-54149","CVE-2023-54153","CVE-2023-54154","CVE-2023-54155","CVE-2023-54156","CVE-2023-54164","CVE-2023-54166","CVE-2023-54169","CVE-2023-54170","CVE-2023-54171","CVE-2023-54172","CVE-2023-54173","CVE-2023-54177","CVE-2023-54178","CVE-2023-54179","CVE-2023-54181","CVE-2023-54183","CVE-2023-54185","CVE-2023-54189","CVE-2023-54194","CVE-2023-54201","CVE-2023-54204","CVE-2023-54207","CVE-2023-54209","CVE-2023-54210","CVE-2023-54211","CVE-2023-54215","CVE-2023-54219","CVE-2023-54220","CVE-2023-54221","CVE-2023-54223","CVE-2023-54224","CVE-2023-54225","CVE-2023-54227","CVE-2023-54229","CVE-2023-54230","CVE-2023-54235","CVE-2023-54240","CVE-2023-54241","CVE-2023-54246","CVE-2023-54247","CVE-2023-54251","CVE-2023-54253","CVE-2023-54254","CVE-2023-54255","CVE-2023-54258","CVE-2023-54261","CVE-2023-54263","CVE-2023-54264","CVE-2023-54266","CVE-2023-54267","CVE-2023-54271","CVE-2023-54276","CVE-2023-54278","CVE-2023-54281","CVE-2023-54282","CVE-2023-54283","CVE-2023-54285","CVE-2023-54289","CVE-2023-54291","CVE-2023-54292","CVE-2023-54293","CVE-2023-54296","CVE-2023-54297","CVE-2023-54299","CVE-2023-54300","CVE-2023-54302","CVE-2023-54303","CVE-2023-54304","CVE-2023-54309","CVE-2023-54312","CVE-2023-54313","CVE-2023-54314","CVE-2023-54315","CVE-2023-54316","CVE-2023-54318","CVE-2023-54319","CVE-2023-54322","CVE-2023-54324","CVE-2023-54326","CVE-2024-26944","CVE-2025-38321","CVE-2025-38728","CVE-2025-39977","CVE-2025-40006","CVE-2025-40024","CVE-2025-40033","CVE-2025-40042","CVE-2025-40053","CVE-2025-40081","CVE-2025-40102","CVE-2025-40123","CVE-2025-40134","CVE-2025-40135","CVE-2025-40153","CVE-2025-40158","CVE-2025-40160","CVE-2025-40167","CVE-2025-40170","CVE-2025-40178","CVE-2025-40179","CVE-2025-40187","CVE-2025-40190","CVE-2025-40211","CVE-2025-40213","CVE-2025-40215","CVE-2025-40219","CVE-2025-40220","CVE-2025-40223","CVE-2025-40225","CVE-2025-40231","CVE-2025-40233","CVE-2025-40240","CVE-2025-40242","CVE-2025-40244","CVE-2025-40248","CVE-2025-40250","CVE-2025-40251","CVE-2025-40252","CVE-2025-40256","CVE-2025-40258","CVE-2025-40262","CVE-2025-40263","CVE-2025-40268","CVE-2025-40269","CVE-2025-40271","CVE-2025-40272","CVE-2025-40273","CVE-2025-40274","CVE-2025-40275","CVE-2025-40276","CVE-2025-40277","CVE-2025-40278","CVE-2025-40279","CVE-2025-40280","CVE-2025-40282","CVE-2025-40283","CVE-2025-40284","CVE-2025-40287","CVE-2025-40288","CVE-2025-40289","CVE-2025-40292","CVE-2025-40293","CVE-2025-40294","CVE-2025-40297","CVE-2025-40301","CVE-2025-40302","CVE-2025-40304","CVE-2025-40306","CVE-2025-40307","CVE-2025-40308","CVE-2025-40309","CVE-2025-40310","CVE-2025-40311","CVE-2025-40312","CVE-2025-40314","CVE-2025-40315","CVE-2025-40316","CVE-2025-40317","CVE-2025-40318","CVE-2025-40319","CVE-2025-40320","CVE-2025-40321","CVE-2025-40322","CVE-2025-40323","CVE-2025-40324","CVE-2025-40329","CVE-2025-40330","CVE-2025-40331","CVE-2025-40332","CVE-2025-40337","CVE-2025-40338","CVE-2025-40339","CVE-2025-40340","CVE-2025-40342","CVE-2025-40343","CVE-2025-40345","CVE-2025-40346","CVE-2025-40347","CVE-2025-40349","CVE-2025-40351","CVE-2025-40354","CVE-2025-40357","CVE-2025-40359","CVE-2025-40360","CVE-2025-68168","CVE-2025-68170","CVE-2025-68172","CVE-2025-68176","CVE-2025-68180","CVE-2025-68181","CVE-2025-68183","CVE-2025-68184","CVE-2025-68185","CVE-2025-68190","CVE-2025-68192","CVE-2025-68194","CVE-2025-68195","CVE-2025-68197","CVE-2025-68201","CVE-2025-68204","CVE-2025-68206","CVE-2025-68207","CVE-2025-68208","CVE-2025-68209","CVE-2025-68217","CVE-2025-68218","CVE-2025-68222","CVE-2025-68223","CVE-2025-68230","CVE-2025-68233","CVE-2025-68235","CVE-2025-68237","CVE-2025-68238","CVE-2025-68239","CVE-2025-68244","CVE-2025-68249","CVE-2025-68252","CVE-2025-68255","CVE-2025-68257","CVE-2025-68258","CVE-2025-68259","CVE-2025-68264","CVE-2025-68286","CVE-2025-68287","CVE-2025-68289","CVE-2025-68290","CVE-2025-68298","CVE-2025-68302","CVE-2025-68303","CVE-2025-68305","CVE-2025-68306","CVE-2025-68307","CVE-2025-68308","CVE-2025-68312","CVE-2025-68313","CVE-2025-68328","CVE-2025-68330","CVE-2025-68331","CVE-2025-68332","CVE-2025-68335","CVE-2025-68339","CVE-2025-68340","CVE-2025-68345","CVE-2025-68346","CVE-2025-68347","CVE-2025-68351","CVE-2025-68354","CVE-2025-68362","CVE-2025-68378","CVE-2025-68380","CVE-2025-68724","CVE-2025-68732","CVE-2025-68734","CVE-2025-68740","CVE-2025-68742","CVE-2025-68744","CVE-2025-68746","CVE-2025-68747","CVE-2025-68749","CVE-2025-68750","CVE-2025-68753","CVE-2025-68757","CVE-2025-68758","CVE-2025-68759","CVE-2025-68765","CVE-2025-68766"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-42752","CVE-2023-53743","CVE-2023-53750","CVE-2023-53752","CVE-2023-53759","CVE-2023-53762","CVE-2023-53766","CVE-2023-53768","CVE-2023-53777","CVE-2023-53778","CVE-2023-53782","CVE-2023-53784","CVE-2023-53785","CVE-2023-53787","CVE-2023-53791","CVE-2023-53792","CVE-2023-53793","CVE-2023-53794","CVE-2023-53795","CVE-2023-53797","CVE-2023-53799","CVE-2023-53807","CVE-2023-53808","CVE-2023-53813","CVE-2023-53815","CVE-2023-53819","CVE-2023-53821","CVE-2023-53823","CVE-2023-53825","CVE-2023-53828","CVE-2023-53831","CVE-2023-53834","CVE-2023-53836","CVE-2023-53839","CVE-2023-53841","CVE-2023-53842","CVE-2023-53843","CVE-2023-53844","CVE-2023-53846","CVE-2023-53847","CVE-2023-53848","CVE-2023-53850","CVE-2023-53851","CVE-2023-53852","CVE-2023-53855","CVE-2023-53856","CVE-2023-53857","CVE-2023-53858","CVE-2023-53860","CVE-2023-53861","CVE-2023-53863","CVE-2023-53864","CVE-2023-53865","CVE-2023-53989","CVE-2023-53992","CVE-2023-53994","CVE-2023-53995","CVE-2023-53996","CVE-2023-53997","CVE-2023-53998","CVE-2023-53999","CVE-2023-54000","CVE-2023-54001","CVE-2023-54005","CVE-2023-54006","CVE-2023-54008","CVE-2023-54014","CVE-2023-54016","CVE-2023-54017","CVE-2023-54019","CVE-2023-54022","CVE-2023-54023","CVE-2023-54025","CVE-2023-54026","CVE-2023-54027","CVE-2023-54030","CVE-2023-54031","CVE-2023-54032","CVE-2023-54035","CVE-2023-54037","CVE-2023-54038","CVE-2023-54042","CVE-2023-54045","CVE-2023-54048","CVE-2023-54049","CVE-2023-54051","CVE-2023-54052","CVE-2023-54060","CVE-2023-54064","CVE-2023-54066","CVE-2023-54067","CVE-2023-54069","CVE-2023-54070","CVE-2023-54072","CVE-2023-54076","CVE-2023-54080","CVE-2023-54081","CVE-2023-54083","CVE-2023-54088","CVE-2023-54089","CVE-2023-54091","CVE-2023-54092","CVE-2023-54093","CVE-2023-54094","CVE-2023-54095","CVE-2023-54096","CVE-2023-54099","CVE-2023-54101","CVE-2023-54104","CVE-2023-54106","CVE-2023-54112","CVE-2023-54113","CVE-2023-54115","CVE-2023-54117","CVE-2023-54121","CVE-2023-54125","CVE-2023-54127","CVE-2023-54133","CVE-2023-54134","CVE-2023-54135","CVE-2023-54136","CVE-2023-54137","CVE-2023-54140","CVE-2023-54141","CVE-2023-54142","CVE-2023-54143","CVE-2023-54145","CVE-2023-54148","CVE-2023-54149","CVE-2023-54153","CVE-2023-54154","CVE-2023-54155","CVE-2023-54156","CVE-2023-54164","CVE-2023-54166","CVE-2023-54169","CVE-2023-54170","CVE-2023-54171","CVE-2023-54172","CVE-2023-54173","CVE-2023-54177","CVE-2023-54178","CVE-2023-54179","CVE-2023-54181","CVE-2023-54183","CVE-2023-54185","CVE-2023-54189","CVE-2023-54194","CVE-2023-54201","CVE-2023-54204","CVE-2023-54207","CVE-2023-54209","CVE-2023-54210","CVE-2023-54211","CVE-2023-54215","CVE-2023-54219","CVE-2023-54220","CVE-2023-54221","CVE-2023-54223","CVE-2023-54224","CVE-2023-54225","CVE-2023-54227","CVE-2023-54229","CVE-2023-54230","CVE-2023-54235","CVE-2023-54240","CVE-2023-54241","CVE-2023-54246","CVE-2023-54247","CVE-2023-54251","CVE-2023-54253","CVE-2023-54254","CVE-2023-54255","CVE-2023-54258","CVE-2023-54261","CVE-2023-54263","CVE-2023-54264","CVE-2023-54266","CVE-2023-54267","CVE-2023-54271","CVE-2023-54276","CVE-2023-54278","CVE-2023-54281","CVE-2023-54282","CVE-2023-54283","CVE-2023-54285","CVE-2023-54289","CVE-2023-54291","CVE-2023-54292","CVE-2023-54293","CVE-2023-54296","CVE-2023-54297","CVE-2023-54299","CVE-2023-54300","CVE-2023-54302","CVE-2023-54303","CVE-2023-54304","CVE-2023-54309","CVE-2023-54312","CVE-2023-54313","CVE-2023-54314","CVE-2023-54315","CVE-2023-54316","CVE-2023-54318","CVE-2023-54319","CVE-2023-54322","CVE-2023-54324","CVE-2023-54326","CVE-2024-26944","CVE-2025-38321","CVE-2025-38728","CVE-2025-39977","CVE-2025-40006","CVE-2025-40024","CVE-2025-40033","CVE-2025-40042","CVE-2025-40053","CVE-2025-40081","CVE-2025-40102","CVE-2025-40123","CVE-2025-40134","CVE-2025-40135","CVE-2025-40153","CVE-2025-40158","CVE-2025-40160","CVE-2025-40167","CVE-2025-40170","CVE-2025-40178","CVE-2025-40179","CVE-2025-40187","CVE-2025-40190","CVE-2025-40211","CVE-2025-40213","CVE-2025-40215","CVE-2025-40219","CVE-2025-40220","CVE-2025-40223","CVE-2025-40225","CVE-2025-40231","CVE-2025-40233","CVE-2025-40240","CVE-2025-40242","CVE-2025-40244","CVE-2025-40248","CVE-2025-40250","CVE-2025-40251","CVE-2025-40252","CVE-2025-40256","CVE-2025-40258","CVE-2025-40262","CVE-2025-40263","CVE-2025-40268","CVE-2025-40269","CVE-2025-40271","CVE-2025-40272","CVE-2025-40273","CVE-2025-40274","CVE-2025-40275","CVE-2025-40276","CVE-2025-40277","CVE-2025-40278","CVE-2025-40279","CVE-2025-40280","CVE-2025-40282","CVE-2025-40283","CVE-2025-40284","CVE-2025-40287","CVE-2025-40288","CVE-2025-40289","CVE-2025-40292","CVE-2025-40293","CVE-2025-40294","CVE-2025-40297","CVE-2025-40301","CVE-2025-40302","CVE-2025-40304","CVE-2025-40306","CVE-2025-40307","CVE-2025-40308","CVE-2025-40309","CVE-2025-40310","CVE-2025-40311","CVE-2025-40312","CVE-2025-40314","CVE-2025-40315","CVE-2025-40316","CVE-2025-40317","CVE-2025-40318","CVE-2025-40319","CVE-2025-40320","CVE-2025-40321","CVE-2025-40322","CVE-2025-40323","CVE-2025-40324","CVE-2025-40329","CVE-2025-40330","CVE-2025-40331","CVE-2025-40332","CVE-2025-40337","CVE-2025-40338","CVE-2025-40339","CVE-2025-40340","CVE-2025-40342","CVE-2025-40343","CVE-2025-40345","CVE-2025-40346","CVE-2025-40347","CVE-2025-40349","CVE-2025-40351","CVE-2025-40354","CVE-2025-40357","CVE-2025-40359","CVE-2025-40360","CVE-2025-68168","CVE-2025-68170","CVE-2025-68172","CVE-2025-68176","CVE-2025-68180","CVE-2025-68181","CVE-2025-68183","CVE-2025-68184","CVE-2025-68185","CVE-2025-68190","CVE-2025-68192","CVE-2025-68194","CVE-2025-68195","CVE-2025-68197","CVE-2025-68201","CVE-2025-68204","CVE-2025-68206","CVE-2025-68207","CVE-2025-68208","CVE-2025-68209","CVE-2025-68217","CVE-2025-68218","CVE-2025-68222","CVE-2025-68223","CVE-2025-68230","CVE-2025-68233","CVE-2025-68235","CVE-2025-68237","CVE-2025-68238","CVE-2025-68239","CVE-2025-68244","CVE-2025-68249","CVE-2025-68252","CVE-2025-68255","CVE-2025-68257","CVE-2025-68258","CVE-2025-68259","CVE-2025-68264","CVE-2025-68286","CVE-2025-68287","CVE-2025-68289","CVE-2025-68290","CVE-2025-68298","CVE-2025-68302","CVE-2025-68303","CVE-2025-68305","CVE-2025-68306","CVE-2025-68307","CVE-2025-68308","CVE-2025-68312","CVE-2025-68313","CVE-2025-68328","CVE-2025-68330","CVE-2025-68331","CVE-2025-68332","CVE-2025-68335","CVE-2025-68339","CVE-2025-68340","CVE-2025-68345","CVE-2025-68346","CVE-2025-68347","CVE-2025-68351","CVE-2025-68354","CVE-2025-68362","CVE-2025-68378","CVE-2025-68380","CVE-2025-68724","CVE-2025-68732","CVE-2025-68734","CVE-2025-68740","CVE-2025-68742","CVE-2025-68744","CVE-2025-68746","CVE-2025-68747","CVE-2025-68749","CVE-2025-68750","CVE-2025-68753","CVE-2025-68757","CVE-2025-68758","CVE-2025-68759","CVE-2025-68765","CVE-2025-68766"]}