{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.290.1","kernel-default-kgraft-devel":"4.12.14-122.290.1","kgraft-patch-4_12_14-122_290-default":"1-8.7.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.290.1","kernel-default-kgraft-devel":"4.12.14-122.290.1","kgraft-patch-4_12_14-122_290-default":"1-8.7.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_76","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_76&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.7.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.290.1","dlm-kmp-default":"4.12.14-122.290.1","gfs2-kmp-default":"4.12.14-122.290.1","kernel-default":"4.12.14-122.290.1","kernel-default-base":"4.12.14-122.290.1","kernel-default-devel":"4.12.14-122.290.1","kernel-default-man":"4.12.14-122.290.1","kernel-devel":"4.12.14-122.290.1","kernel-macros":"4.12.14-122.290.1","kernel-source":"4.12.14-122.290.1","kernel-syms":"4.12.14-122.290.1","ocfs2-kmp-default":"4.12.14-122.290.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.290.1","dlm-kmp-default":"4.12.14-122.290.1","gfs2-kmp-default":"4.12.14-122.290.1","kernel-default":"4.12.14-122.290.1","kernel-default-base":"4.12.14-122.290.1","kernel-default-devel":"4.12.14-122.290.1","kernel-default-man":"4.12.14-122.290.1","kernel-devel":"4.12.14-122.290.1","kernel-macros":"4.12.14-122.290.1","kernel-source":"4.12.14-122.290.1","kernel-syms":"4.12.14-122.290.1","ocfs2-kmp-default":"4.12.14-122.290.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.290.1","dlm-kmp-default":"4.12.14-122.290.1","gfs2-kmp-default":"4.12.14-122.290.1","kernel-default":"4.12.14-122.290.1","kernel-default-base":"4.12.14-122.290.1","kernel-default-devel":"4.12.14-122.290.1","kernel-default-man":"4.12.14-122.290.1","kernel-devel":"4.12.14-122.290.1","kernel-macros":"4.12.14-122.290.1","kernel-source":"4.12.14-122.290.1","kernel-syms":"4.12.14-122.290.1","ocfs2-kmp-default":"4.12.14-122.290.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.290.1","dlm-kmp-default":"4.12.14-122.290.1","gfs2-kmp-default":"4.12.14-122.290.1","kernel-default":"4.12.14-122.290.1","kernel-default-base":"4.12.14-122.290.1","kernel-default-devel":"4.12.14-122.290.1","kernel-devel":"4.12.14-122.290.1","kernel-macros":"4.12.14-122.290.1","kernel-source":"4.12.14-122.290.1","kernel-syms":"4.12.14-122.290.1","ocfs2-kmp-default":"4.12.14-122.290.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.290.1","dlm-kmp-default":"4.12.14-122.290.1","gfs2-kmp-default":"4.12.14-122.290.1","kernel-default":"4.12.14-122.290.1","kernel-default-base":"4.12.14-122.290.1","kernel-default-devel":"4.12.14-122.290.1","kernel-devel":"4.12.14-122.290.1","kernel-macros":"4.12.14-122.290.1","kernel-source":"4.12.14-122.290.1","kernel-syms":"4.12.14-122.290.1","ocfs2-kmp-default":"4.12.14-122.290.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.290.1","dlm-kmp-default":"4.12.14-122.290.1","gfs2-kmp-default":"4.12.14-122.290.1","kernel-default":"4.12.14-122.290.1","kernel-default-base":"4.12.14-122.290.1","kernel-default-devel":"4.12.14-122.290.1","kernel-devel":"4.12.14-122.290.1","kernel-macros":"4.12.14-122.290.1","kernel-source":"4.12.14-122.290.1","kernel-syms":"4.12.14-122.290.1","ocfs2-kmp-default":"4.12.14-122.290.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.290.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-49604,CVE-2025-40074: ip: Fix data-races around sysctl_ip_fwd_use_pmtu (bsc#1238414 bsc#1252794).\n- CVE-2022-50527: drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1251738).\n- CVE-2022-50625: serial: amba-pl011: avoid SBSA UART accessing DMACR register (bsc#1254559).\n- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).\n- CVE-2022-50656: nfc: pn533: Clear nfc_target before being used (bsc#1254745).\n- CVE-2022-50678: wifi: brcmfmac: fix invalid address access when enabling SCAN log level (bsc#1254902).\n- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).\n- CVE-2023-53454: HID: multitouch: Correct devm device reference for hidinput input_dev name (bsc#1250759).\n- CVE-2023-53718: ring-buffer: Do not swap cpu_buffer during resize process (bsc#1252564).\n- CVE-2023-53748: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup (bsc#1254907).\n- CVE-2023-53765: dm cache: free background tracker's queued work in btracker_destroy (bsc#1254912).\n- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).\n- CVE-2023-53788: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (bsc#1254917).\n- CVE-2023-53819: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (bsc#1254712).\n- CVE-2023-53850: iavf: use internal state to free traffic IRQs (bsc#1254677).\n- CVE-2023-54120: Bluetooth: Fix race condition in hidp_session_thread (bsc#1256133).\n- CVE-2023-54214: Bluetooth: L2CAP: Fix potential user-after-free (bsc#1255954).\n- CVE-2023-54236: net/net_failover: fix txq exceeding warning (bsc#1255922).\n- CVE-2023-54286: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (bsc#1255803).\n- CVE-2023-54300: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (bsc#1255790).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38336: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 (bsc#1246370).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40035: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (bsc#1252866).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40110: drm/vmwgfx: Fix a null-ptr access in the cursor snooper (bsc#1253275).\n- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).\n- CVE-2025-40164: usbnet: Fix using smp_processor_id() in preemptible code warnings (bsc#1253407).\n- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40198: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (bsc#1253453).\n- CVE-2025-40200: Squashfs: reject negative file sizes in squashfs_read_inode() (bsc#1253448).\n- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).\n- CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (bsc#1254518).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is missing (bsc#1254869).\n- CVE-2025-40244: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() (bsc#1255033).\n- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).\n- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849).\n- CVE-2025-40269: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (bsc#1255035).\n- CVE-2025-40275: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (bsc#1254829).\n- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).\n- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).\n- CVE-2025-40283: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (bsc#1254858).\n- CVE-2025-40304: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (bsc#1255034).\n- CVE-2025-40308: Bluetooth: bcsp: receive data only if registered (bsc#1255064).\n- CVE-2025-40321: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode (bsc#1254795).\n- CVE-2025-40322: fbdev: bitblit: bound-check glyph index in bit_putcs* (bsc#1255092).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors (bsc#1255081).\n- CVE-2025-40349: hfs: validate record offset in hfsplus_bmap_alloc (bsc#1255280).\n- CVE-2025-40351: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (bsc#1255281).\n- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).\n- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).\n\nThe following non security issues were fixed:\n\n- HID: multitouch: Add NULL check in mt_input_configured (bsc#1250759).\n- Squashfs: add additional inode sanity checking (bsc#1253448).\n- drm/amdgpu: Fix potential NULL dereference (bsc#1251238).\n","id":"SUSE-SU-2026:0316-1","modified":"2026-01-28T14:35:14Z","published":"2026-01-28T14:35:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1152446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212173"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249991"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253365"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253408"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253448"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254559"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254692"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254917"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255064"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255281"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255922"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255949"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255993"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256064"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256271"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50527"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50625"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50638"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20569"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53454"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53803"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53832"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53847"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54123"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54186"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54260"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54266"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54294"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54300"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54317"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38336"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40075"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40123"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40248"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40256"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68340"}],"related":["CVE-2022-49546","CVE-2022-49604","CVE-2022-49975","CVE-2022-50527","CVE-2022-50615","CVE-2022-50625","CVE-2022-50630","CVE-2022-50636","CVE-2022-50638","CVE-2022-50640","CVE-2022-50643","CVE-2022-50646","CVE-2022-50656","CVE-2022-50668","CVE-2022-50677","CVE-2022-50678","CVE-2022-50700","CVE-2022-50706","CVE-2022-50715","CVE-2022-50728","CVE-2022-50730","CVE-2022-50733","CVE-2022-50747","CVE-2022-50755","CVE-2022-50761","CVE-2022-50779","CVE-2022-50821","CVE-2022-50824","CVE-2022-50840","CVE-2022-50849","CVE-2022-50850","CVE-2022-50859","CVE-2022-50870","CVE-2022-50879","CVE-2023-20569","CVE-2023-23559","CVE-2023-4132","CVE-2023-53020","CVE-2023-53176","CVE-2023-53454","CVE-2023-53718","CVE-2023-53746","CVE-2023-53748","CVE-2023-53754","CVE-2023-53765","CVE-2023-53781","CVE-2023-53786","CVE-2023-53788","CVE-2023-53803","CVE-2023-53809","CVE-2023-53819","CVE-2023-53832","CVE-2023-53840","CVE-2023-53847","CVE-2023-53850","CVE-2023-53862","CVE-2023-54014","CVE-2023-54017","CVE-2023-54021","CVE-2023-54032","CVE-2023-54045","CVE-2023-54051","CVE-2023-54070","CVE-2023-54091","CVE-2023-54095","CVE-2023-54108","CVE-2023-54110","CVE-2023-54119","CVE-2023-54120","CVE-2023-54123","CVE-2023-54130","CVE-2023-54146","CVE-2023-54168","CVE-2023-54170","CVE-2023-54177","CVE-2023-54179","CVE-2023-54186","CVE-2023-54197","CVE-2023-54211","CVE-2023-54213","CVE-2023-54214","CVE-2023-54220","CVE-2023-54224","CVE-2023-54226","CVE-2023-54236","CVE-2023-54260","CVE-2023-54264","CVE-2023-54266","CVE-2023-54270","CVE-2023-54271","CVE-2023-54286","CVE-2023-54289","CVE-2023-54294","CVE-2023-54300","CVE-2023-54309","CVE-2023-54317","CVE-2025-38085","CVE-2025-38336","CVE-2025-38728","CVE-2025-40006","CVE-2025-40035","CVE-2025-40053","CVE-2025-40064","CVE-2025-40075","CVE-2025-40081","CVE-2025-40110","CVE-2025-40123","CVE-2025-40135","CVE-2025-40139","CVE-2025-40149","CVE-2025-40153","CVE-2025-40158","CVE-2025-40160","CVE-2025-40164","CVE-2025-40167","CVE-2025-40168","CVE-2025-40170","CVE-2025-40178","CVE-2025-40198","CVE-2025-40200","CVE-2025-40215","CVE-2025-40219","CVE-2025-40233","CVE-2025-40240","CVE-2025-40244","CVE-2025-40248","CVE-2025-40252","CVE-2025-40256","CVE-2025-40269","CVE-2025-40275","CVE-2025-40278","CVE-2025-40279","CVE-2025-40283","CVE-2025-40304","CVE-2025-40308","CVE-2025-40321","CVE-2025-40322","CVE-2025-40331","CVE-2025-40337","CVE-2025-40349","CVE-2025-40351","CVE-2025-68206","CVE-2025-68340"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-49546","CVE-2022-49604","CVE-2022-49975","CVE-2022-50527","CVE-2022-50615","CVE-2022-50625","CVE-2022-50630","CVE-2022-50636","CVE-2022-50638","CVE-2022-50640","CVE-2022-50643","CVE-2022-50646","CVE-2022-50656","CVE-2022-50668","CVE-2022-50677","CVE-2022-50678","CVE-2022-50700","CVE-2022-50706","CVE-2022-50715","CVE-2022-50728","CVE-2022-50730","CVE-2022-50733","CVE-2022-50747","CVE-2022-50755","CVE-2022-50761","CVE-2022-50779","CVE-2022-50821","CVE-2022-50824","CVE-2022-50840","CVE-2022-50849","CVE-2022-50850","CVE-2022-50859","CVE-2022-50870","CVE-2022-50879","CVE-2023-20569","CVE-2023-23559","CVE-2023-4132","CVE-2023-53020","CVE-2023-53176","CVE-2023-53454","CVE-2023-53718","CVE-2023-53746","CVE-2023-53748","CVE-2023-53754","CVE-2023-53765","CVE-2023-53781","CVE-2023-53786","CVE-2023-53788","CVE-2023-53803","CVE-2023-53809","CVE-2023-53819","CVE-2023-53832","CVE-2023-53840","CVE-2023-53847","CVE-2023-53850","CVE-2023-53862","CVE-2023-54014","CVE-2023-54017","CVE-2023-54021","CVE-2023-54032","CVE-2023-54045","CVE-2023-54051","CVE-2023-54070","CVE-2023-54091","CVE-2023-54095","CVE-2023-54108","CVE-2023-54110","CVE-2023-54119","CVE-2023-54120","CVE-2023-54123","CVE-2023-54130","CVE-2023-54146","CVE-2023-54168","CVE-2023-54170","CVE-2023-54177","CVE-2023-54179","CVE-2023-54186","CVE-2023-54197","CVE-2023-54211","CVE-2023-54213","CVE-2023-54214","CVE-2023-54220","CVE-2023-54224","CVE-2023-54226","CVE-2023-54236","CVE-2023-54260","CVE-2023-54264","CVE-2023-54266","CVE-2023-54270","CVE-2023-54271","CVE-2023-54286","CVE-2023-54289","CVE-2023-54294","CVE-2023-54300","CVE-2023-54309","CVE-2023-54317","CVE-2025-38085","CVE-2025-38336","CVE-2025-38728","CVE-2025-40006","CVE-2025-40035","CVE-2025-40053","CVE-2025-40064","CVE-2025-40075","CVE-2025-40081","CVE-2025-40110","CVE-2025-40123","CVE-2025-40135","CVE-2025-40139","CVE-2025-40149","CVE-2025-40153","CVE-2025-40158","CVE-2025-40160","CVE-2025-40164","CVE-2025-40167","CVE-2025-40168","CVE-2025-40170","CVE-2025-40178","CVE-2025-40198","CVE-2025-40200","CVE-2025-40215","CVE-2025-40219","CVE-2025-40233","CVE-2025-40240","CVE-2025-40244","CVE-2025-40248","CVE-2025-40252","CVE-2025-40256","CVE-2025-40269","CVE-2025-40275","CVE-2025-40278","CVE-2025-40279","CVE-2025-40283","CVE-2025-40304","CVE-2025-40308","CVE-2025-40321","CVE-2025-40322","CVE-2025-40331","CVE-2025-40337","CVE-2025-40349","CVE-2025-40351","CVE-2025-68206","CVE-2025-68340"]}