{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.269.1","kernel-default-kgraft-devel":"4.12.14-122.269.1","kgraft-patch-4_12_14-122_269-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.269.1","kernel-default-kgraft-devel":"4.12.14-122.269.1","kgraft-patch-4_12_14-122_269-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_71","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_71&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.269.1","dlm-kmp-default":"4.12.14-122.269.1","gfs2-kmp-default":"4.12.14-122.269.1","kernel-default":"4.12.14-122.269.1","kernel-default-base":"4.12.14-122.269.1","kernel-default-devel":"4.12.14-122.269.1","kernel-default-man":"4.12.14-122.269.1","kernel-devel":"4.12.14-122.269.1","kernel-macros":"4.12.14-122.269.1","kernel-source":"4.12.14-122.269.1","kernel-syms":"4.12.14-122.269.1","ocfs2-kmp-default":"4.12.14-122.269.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.269.1","dlm-kmp-default":"4.12.14-122.269.1","gfs2-kmp-default":"4.12.14-122.269.1","kernel-default":"4.12.14-122.269.1","kernel-default-base":"4.12.14-122.269.1","kernel-default-devel":"4.12.14-122.269.1","kernel-default-man":"4.12.14-122.269.1","kernel-devel":"4.12.14-122.269.1","kernel-macros":"4.12.14-122.269.1","kernel-source":"4.12.14-122.269.1","kernel-syms":"4.12.14-122.269.1","ocfs2-kmp-default":"4.12.14-122.269.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.269.1","dlm-kmp-default":"4.12.14-122.269.1","gfs2-kmp-default":"4.12.14-122.269.1","kernel-default":"4.12.14-122.269.1","kernel-default-base":"4.12.14-122.269.1","kernel-default-devel":"4.12.14-122.269.1","kernel-default-man":"4.12.14-122.269.1","kernel-devel":"4.12.14-122.269.1","kernel-macros":"4.12.14-122.269.1","kernel-source":"4.12.14-122.269.1","kernel-syms":"4.12.14-122.269.1","ocfs2-kmp-default":"4.12.14-122.269.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.269.1","dlm-kmp-default":"4.12.14-122.269.1","gfs2-kmp-default":"4.12.14-122.269.1","kernel-default":"4.12.14-122.269.1","kernel-default-base":"4.12.14-122.269.1","kernel-default-devel":"4.12.14-122.269.1","kernel-devel":"4.12.14-122.269.1","kernel-macros":"4.12.14-122.269.1","kernel-source":"4.12.14-122.269.1","kernel-syms":"4.12.14-122.269.1","ocfs2-kmp-default":"4.12.14-122.269.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.269.1","dlm-kmp-default":"4.12.14-122.269.1","gfs2-kmp-default":"4.12.14-122.269.1","kernel-default":"4.12.14-122.269.1","kernel-default-base":"4.12.14-122.269.1","kernel-default-devel":"4.12.14-122.269.1","kernel-devel":"4.12.14-122.269.1","kernel-macros":"4.12.14-122.269.1","kernel-source":"4.12.14-122.269.1","kernel-syms":"4.12.14-122.269.1","ocfs2-kmp-default":"4.12.14-122.269.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.269.1","dlm-kmp-default":"4.12.14-122.269.1","gfs2-kmp-default":"4.12.14-122.269.1","kernel-default":"4.12.14-122.269.1","kernel-default-base":"4.12.14-122.269.1","kernel-default-devel":"4.12.14-122.269.1","kernel-devel":"4.12.14-122.269.1","kernel-macros":"4.12.14-122.269.1","kernel-source":"4.12.14-122.269.1","kernel-syms":"4.12.14-122.269.1","ocfs2-kmp-default":"4.12.14-122.269.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.269.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-46984: Fixed an out of bounds access in kyber_bio_merge() in kyber (bsc#1220631).\n- CVE-2021-46987: btrfs: fix deadlock when cloning inline extents and using qgroups (bsc#1220704).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference (bsc#1205711).\n- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).\n- CVE-2022-49319: iommu/arm-smmu-v3: check return value after calling platform_get_resource() (bsc#1238374).\n- CVE-2022-49323: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (bsc#1238400).\n- CVE-2022-49768: 9p/fd: fix issue of list_del corruption in p9_fd_cancel() (bsc#1242446).\n- CVE-2022-49825: ata: libata-transport: fix error handling in ata_tport_add() (bsc#1242548).\n- CVE-2022-49934: wifi: mac80211: Fix UAF in ieee80211_scan_rx() (bsc#1245051).\n- CVE-2022-49948: vt: Clear selection before changing the font (bsc#1245058).\n- CVE-2022-49969: drm/amd/display: clear optc underflow before turn off odm clock (bsc#1245060).\n- CVE-2022-49993: loop: Check for overflow while configuring loop (bsc#1245121).\n- CVE-2022-50025: cxl: Fix a memory leak in an error handling path (bsc#1245132).\n- CVE-2022-50027: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1245073).\n- CVE-2022-50030: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1245265).\n- CVE-2022-50033: usb: host: ohci-ppc-of: Fix refcount leak bug (bsc#1245139).\n- CVE-2022-50103: sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed (bsc#1244840).\n- CVE-2022-50149: driver core: fix potential deadlock in __driver_attach (bsc#1244883).\n- CVE-2022-50226: crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (bsc#1244860).\n- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).\n- CVE-2023-52878: can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (bsc#1225000).\n- CVE-2023-53020: l2tp: close all race conditions in l2tp_tunnel_register() (bsc#1240224).\n- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).\n- CVE-2023-53118: scsi: core: Fix a procfs host directory removal regression (bsc#1242365).\n- CVE-2024-26974: crypto: qat - resolve race condition during AER recovery (bsc#1223638).\n- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).\n- CVE-2024-44963: btrfs: do not BUG_ON() when freeing tree block after error (bsc#1230216).\n- CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581).\n- CVE-2024-49861: net: clear the dst when changing skb protocol (bsc#1245954).\n- CVE-2025-21731: nbd: do not allow reconnect after disconnect (bsc#1237881).\n- CVE-2025-21928: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (bsc#1240722).\n- CVE-2025-23163: net: vlan: do not propagate flags on open (bsc#1242837).\n- CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068).\n- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).\n- CVE-2025-37920: kABI workaround for xsk: Fix race condition in AF_XDP generic RX path (bsc#1243479).\n- CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792).\n- CVE-2025-38035: nvmet-tcp: do not restore null sk_state_change (bsc#1244801).\n- CVE-2025-38040: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (bsc#1245078).\n- CVE-2025-38051: smb: client: Fix use-after-free in cifs_fill_dirent (bsc#1244750).\n- CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151).\n- CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown() (bsc#1245201).\n- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).\n- CVE-2025-38074: vhost-scsi: protect vq->log_used with vq->mutex (bsc#1244735).\n- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).\n- CVE-2025-38094: net: cadence: macb: Fix a possible deadlock in macb_halt_tx (bsc#1245649).\n- CVE-2025-38105: ALSA: usb-audio: Kill timer properly at removal (bsc#1245682).\n- CVE-2025-38108: net_sched: red: fix a race in __red_change() (bsc#1245675).\n- CVE-2025-38112: net: Fix TOCTOU issue in sk_is_readable() (bsc#1245668).\n- CVE-2025-38115: net_sched: sch_sfq: fix a potential crash on gso_skb handling (bsc#1245689).\n- CVE-2025-38126: net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping (bsc#1245708).\n- CVE-2025-38147: calipso: unlock rcu before returning -EAFNOSUPPORT (bsc#1245768).\n- CVE-2025-38157: wifi: ath9k_htc: Abort software beacon handling if disabled (bsc#1245747).\n- CVE-2025-38161: RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (bsc#1245777).\n- CVE-2025-38166: bpf: fix ktls panic with sockmap (bsc#1245758).\n- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).\n- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).\n- CVE-2025-38193: net_sched: sch_sfq: reject invalid perturb period (bsc#1245945).\n- CVE-2025-38198: fbcon: Make sure modelist not set on unregistered console (bsc#1245952).\n- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).\n- CVE-2025-38211: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (bsc#1246008).\n- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).\n- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).\n- CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976).\n- CVE-2025-38249: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() (bsc#1246171).\n- CVE-2025-38250: kABI workaround for bluetooth hci_dev changes (bsc#1246182).\n- CVE-2025-38264: llist: add interface to check if a node is on a list (bsc#1246387).\n- CVE-2025-38312: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (bsc#1246386).\n- CVE-2025-38319: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (bsc#1246243).\n- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).\n- CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253).\n- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).\n- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).\n- CVE-2025-38391: usb: typec: altmodes/displayport: do not index invalid pin_assignments (bsc#1247181).\n- CVE-2025-38403: vsock/vmci: Clear the vmci transport packet properly when initializing it (bsc#1247141).\n- CVE-2025-38415: Squashfs: check return result of sb_min_blocksize (bsc#1247147).\n- CVE-2025-38420: wifi: carl9170: do not ping device which has failed to load firmware (bsc#1247279).\n- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).\n- CVE-2025-38477: net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (bsc#1247314).\n- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).\n- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).\n\nThe following non-security bugs were fixed:\n\n- RDMA/core: Always release restrack object (git-fixes)\n- bdi: Fix up kabi for dev_name addition (bsc#1171844).\n- bdi: add a ->dev_name field to struct backing_dev_info (bsc#1171844).\n- l2tp: Do not sleep and disable BH under writer-side sk_callback_lock (git-fixes).\n- l2tp: fix a sock refcnt leak in l2tp_tunnel_register (git-fixes).\n- scsi: core: Fix a source code comment (git-fixes).\n- scsi: core: Fix unremoved procfs host directory regression (git-fixes).\n- scsi: drivers: base: Propagate errors through the transport component (bsc#1242548)\n- scsi: drivers: base: Support atomic version of attribute_container_device_trigger (bsc#1242548)\n- virtgpu: do not reset on shutdown (git-fixes).\n","id":"SUSE-SU-2025:02846-1","modified":"2025-08-18T15:47:45Z","published":"2025-08-18T15:47:45Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502846-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171844"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242365"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245078"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245121"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245265"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245668"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245675"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245970"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246029"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246459"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247437"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21731"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38034"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38193"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38250"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38375"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38415"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38468"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38495"}],"related":["CVE-2021-46984","CVE-2021-46987","CVE-2022-4129","CVE-2022-49138","CVE-2022-49319","CVE-2022-49323","CVE-2022-49768","CVE-2022-49825","CVE-2022-49934","CVE-2022-49948","CVE-2022-49969","CVE-2022-49993","CVE-2022-50025","CVE-2022-50027","CVE-2022-50030","CVE-2022-50033","CVE-2022-50103","CVE-2022-50149","CVE-2022-50226","CVE-2023-2176","CVE-2023-52878","CVE-2023-53020","CVE-2023-53117","CVE-2023-53118","CVE-2024-26974","CVE-2024-26982","CVE-2024-44963","CVE-2024-46713","CVE-2024-49861","CVE-2025-21731","CVE-2025-21928","CVE-2025-23163","CVE-2025-37798","CVE-2025-37856","CVE-2025-37885","CVE-2025-37920","CVE-2025-38034","CVE-2025-38035","CVE-2025-38040","CVE-2025-38051","CVE-2025-38058","CVE-2025-38064","CVE-2025-38068","CVE-2025-38074","CVE-2025-38079","CVE-2025-38094","CVE-2025-38105","CVE-2025-38108","CVE-2025-38112","CVE-2025-38115","CVE-2025-38126","CVE-2025-38147","CVE-2025-38157","CVE-2025-38161","CVE-2025-38166","CVE-2025-38177","CVE-2025-38180","CVE-2025-38181","CVE-2025-38192","CVE-2025-38193","CVE-2025-38198","CVE-2025-38200","CVE-2025-38211","CVE-2025-38212","CVE-2025-38213","CVE-2025-38222","CVE-2025-38249","CVE-2025-38250","CVE-2025-38264","CVE-2025-38312","CVE-2025-38319","CVE-2025-38323","CVE-2025-38337","CVE-2025-38350","CVE-2025-38375","CVE-2025-38391","CVE-2025-38403","CVE-2025-38415","CVE-2025-38420","CVE-2025-38468","CVE-2025-38477","CVE-2025-38494","CVE-2025-38495"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-46984","CVE-2021-46987","CVE-2022-4129","CVE-2022-49138","CVE-2022-49319","CVE-2022-49323","CVE-2022-49768","CVE-2022-49825","CVE-2022-49934","CVE-2022-49948","CVE-2022-49969","CVE-2022-49993","CVE-2022-50025","CVE-2022-50027","CVE-2022-50030","CVE-2022-50033","CVE-2022-50103","CVE-2022-50149","CVE-2022-50226","CVE-2023-2176","CVE-2023-52878","CVE-2023-53020","CVE-2023-53117","CVE-2023-53118","CVE-2024-26974","CVE-2024-26982","CVE-2024-44963","CVE-2024-46713","CVE-2024-49861","CVE-2025-21731","CVE-2025-21928","CVE-2025-23163","CVE-2025-37798","CVE-2025-37856","CVE-2025-37885","CVE-2025-37920","CVE-2025-38034","CVE-2025-38035","CVE-2025-38040","CVE-2025-38051","CVE-2025-38058","CVE-2025-38064","CVE-2025-38068","CVE-2025-38074","CVE-2025-38079","CVE-2025-38094","CVE-2025-38105","CVE-2025-38108","CVE-2025-38112","CVE-2025-38115","CVE-2025-38126","CVE-2025-38147","CVE-2025-38157","CVE-2025-38161","CVE-2025-38166","CVE-2025-38177","CVE-2025-38180","CVE-2025-38181","CVE-2025-38192","CVE-2025-38193","CVE-2025-38198","CVE-2025-38200","CVE-2025-38211","CVE-2025-38212","CVE-2025-38213","CVE-2025-38222","CVE-2025-38249","CVE-2025-38250","CVE-2025-38264","CVE-2025-38312","CVE-2025-38319","CVE-2025-38323","CVE-2025-38337","CVE-2025-38350","CVE-2025-38375","CVE-2025-38391","CVE-2025-38403","CVE-2025-38415","CVE-2025-38420","CVE-2025-38468","CVE-2025-38477","CVE-2025-38494","CVE-2025-38495"]}