{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.250.1","kernel-default-kgraft-devel":"4.12.14-122.250.1","kgraft-patch-4_12_14-122_250-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.250.1","kernel-default-kgraft-devel":"4.12.14-122.250.1","kgraft-patch-4_12_14-122_250-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_66","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_66&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.250.1","dlm-kmp-default":"4.12.14-122.250.1","gfs2-kmp-default":"4.12.14-122.250.1","kernel-default":"4.12.14-122.250.1","kernel-default-base":"4.12.14-122.250.1","kernel-default-devel":"4.12.14-122.250.1","kernel-default-man":"4.12.14-122.250.1","kernel-devel":"4.12.14-122.250.1","kernel-macros":"4.12.14-122.250.1","kernel-source":"4.12.14-122.250.1","kernel-syms":"4.12.14-122.250.1","ocfs2-kmp-default":"4.12.14-122.250.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.250.1","dlm-kmp-default":"4.12.14-122.250.1","gfs2-kmp-default":"4.12.14-122.250.1","kernel-default":"4.12.14-122.250.1","kernel-default-base":"4.12.14-122.250.1","kernel-default-devel":"4.12.14-122.250.1","kernel-default-man":"4.12.14-122.250.1","kernel-devel":"4.12.14-122.250.1","kernel-macros":"4.12.14-122.250.1","kernel-source":"4.12.14-122.250.1","kernel-syms":"4.12.14-122.250.1","ocfs2-kmp-default":"4.12.14-122.250.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.250.1","dlm-kmp-default":"4.12.14-122.250.1","gfs2-kmp-default":"4.12.14-122.250.1","kernel-default":"4.12.14-122.250.1","kernel-default-base":"4.12.14-122.250.1","kernel-default-devel":"4.12.14-122.250.1","kernel-default-man":"4.12.14-122.250.1","kernel-devel":"4.12.14-122.250.1","kernel-macros":"4.12.14-122.250.1","kernel-source":"4.12.14-122.250.1","kernel-syms":"4.12.14-122.250.1","ocfs2-kmp-default":"4.12.14-122.250.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.250.1","dlm-kmp-default":"4.12.14-122.250.1","gfs2-kmp-default":"4.12.14-122.250.1","kernel-default":"4.12.14-122.250.1","kernel-default-base":"4.12.14-122.250.1","kernel-default-devel":"4.12.14-122.250.1","kernel-devel":"4.12.14-122.250.1","kernel-macros":"4.12.14-122.250.1","kernel-source":"4.12.14-122.250.1","kernel-syms":"4.12.14-122.250.1","ocfs2-kmp-default":"4.12.14-122.250.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.250.1","dlm-kmp-default":"4.12.14-122.250.1","gfs2-kmp-default":"4.12.14-122.250.1","kernel-default":"4.12.14-122.250.1","kernel-default-base":"4.12.14-122.250.1","kernel-default-devel":"4.12.14-122.250.1","kernel-devel":"4.12.14-122.250.1","kernel-macros":"4.12.14-122.250.1","kernel-source":"4.12.14-122.250.1","kernel-syms":"4.12.14-122.250.1","ocfs2-kmp-default":"4.12.14-122.250.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.250.1","dlm-kmp-default":"4.12.14-122.250.1","gfs2-kmp-default":"4.12.14-122.250.1","kernel-default":"4.12.14-122.250.1","kernel-default-base":"4.12.14-122.250.1","kernel-default-devel":"4.12.14-122.250.1","kernel-devel":"4.12.14-122.250.1","kernel-macros":"4.12.14-122.250.1","kernel-source":"4.12.14-122.250.1","kernel-syms":"4.12.14-122.250.1","ocfs2-kmp-default":"4.12.14-122.250.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.250.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM (bsc#1186482).\n- CVE-2021-47634: ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl (bsc#1237758).\n- CVE-2021-47644: media: staging: media: zoran: move videodev alloc (bsc#1237766).\n- CVE-2022-48953: rtc: cmos: fix build on non-ACPI platforms (bsc#1231941).\n- CVE-2022-48975: gpiolib: fix memory leak in gpiochip_setup_dev() (bsc#1231885).\n- CVE-2022-49006: tracing: Free buffers when a used dynamic event is removed (bsc#1232163).\n- CVE-2022-49076: RDMA/hfi1: Fix use-after-free bug for mm struct (bsc#1237738).\n- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).\n- CVE-2022-49089: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (bsc#1238041).\n- CVE-2022-49124: x86/mce: Work around an erratum on fast string copy instructions (bsc#1238148).\n- CVE-2022-49134: mlxsw: spectrum: Guard against invalid local ports (bsc#1237982).\n- CVE-2022-49135: drm/amd/display: Fix memory leak (bsc#1238006).\n- CVE-2022-49151: can: mcba_usb: properly check endpoint type (bsc#1237778).\n- CVE-2022-49178: memstick/mspro_block: fix handling of read-only devices (bsc#1238107).\n- CVE-2022-49182: net: hns3: add vlan list lock to protect vlan list (bsc#1238260).\n- CVE-2022-49201: ibmvnic: fix race between xmit and reset (bsc#1238256).\n- CVE-2022-49247: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (bsc#1237783).\n- CVE-2022-49490: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is (bsc#1238275).\n- CVE-2022-49626: sfc: fix use after free when disabling sriov (bsc#1238270).\n- CVE-2022-49661: can: gs_usb: gs_usb_open/close(): fix memory leak (bsc#1237788).\n- CVE-2023-52572: Fixed UAF in cifs_demultiplex_thread() in cifs (bsc#1220946).\n- CVE-2023-52853: hid: cp2112: Fix duplicate workqueue initialization (bsc#1224988).\n- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).\n- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).\n- CVE-2024-49963: mailbox: bcm2835: Fix timeout during suspend mode (bsc#1232147).\n- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).\n- CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912).\n- CVE-2024-50067: uprobe: avoid out-of-bounds memory access of fetching args (bsc#1232416).\n- CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248).\n- CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522).\n- CVE-2024-53217: nfsd: restore callback functionality for NFSv4.0 (bsc#1234999).\n- CVE-2024-56633: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data (bsc#1235485).\n- CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435).\n- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).\n- CVE-2024-56688: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (bsc#1235538).\n- CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115).\n- CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122).\n- CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123).\n- CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689).\n- CVE-2025-21689: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (bsc#1237017).\n- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875).\n\nThe following non-security bugs were fixed:\n\n- bpf: fix mixed signed/unsigned derived min/max value bounds (bsc#1050081).\n- btrfs: add a flag to iterate_inodes_from_logical to find all\n- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- drm/amd/powerplay: Fix missing break in switch (bsc#1120902)\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: always return something on DDI clock selection (bsc#1120902)\n- drm/msm/mdp5: Fix global state lock backoff (bsc#1238275)\n- fix SCTP regression (bsc#1158082)\n- fixup 'rpm: support gz and zst compression methods' once more (bsc#1190428, bsc#1190358).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- kABI: Add clear_trace to trace_array (bsc#1232163).\n- kABI: Preserve TRACE_EVENT_FL values (bsc#1232163).\n- mm, numa: Migrate pages to local nodes quicker early in the lifetime of a task (bnc#1101669).\n- mm, numa: Remove rate-limiting of automatic numa balancing migration (bnc#1101669).\n- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).\n- net: netvsc: Update default VMBus channels (bsc#1236757).\n- powerpc/64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- powerpc/papr_scm: Fix DIMM device registration race  (FATE#326628, bsc#1113295, git-fixes).\n- powerpc/papr_scm: Fix DIMM device registration race (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Fix resource end address (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Fix resource end address (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Remove endian conversions (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Remove endian conversions (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Update DT properties (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Update DT properties (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use depend instead of select (FATE#326628,  bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use depend instead of select (bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use ibm,unit-guid as the iset cookie  (FATE#326628, bsc#1113295, git-fixes).\n- powerpc/papr_scm: Use ibm,unit-guid as the iset cookie (bsc#1113295, git-fixes).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression\n- rpm/kernel-source.spec.in: Add subpackage-names.conf as source.\n- s390/cpum_cf: rename IBM z13/z14 counter names (FATE#326341,  LTC#169491, bsc#1100823).\n- s390/cpum_cf: rename IBM z13/z14 counter names (LTC#169491, bsc#1100823).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- sched/numa: Avoid task migration for small NUMA improvement (bnc#1101669).\n- sched/numa: Pass destination CPU as a parameter to migrate_task_rq (bnc#1101669).\n- sched/numa: Reset scan rate whenever task moves across nodes (bnc#1101669).\n- sched/numa: Stop multiple tasks from moving to the CPU at the same time (bnc#1101669).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: storvsc: Add validation for untrusted Hyper-V values (git-fixes).\n- scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix spelling mistake (git-fixes).\n- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).\n- scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).\n- scsi: storvsc: Miscellaneous code cleanups (git-fixes).\n- scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).\n- scsi: storvsc: Update error logging (git-fixes).\n- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- tracing: Only have rmmod clear buffers that its events were active in (bsc#1232163).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n","id":"SUSE-SU-2025:0834-1","modified":"2025-03-11T10:55:11Z","published":"2025-03-11T10:55:11Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1100823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1104731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1113295"},{"type":"REPORT","url":"https://bugzilla.suse.com/1120902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188601"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233522"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234999"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-22543"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-37159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47634"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49151"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49247"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49626"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0394"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52572"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27054"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50251"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53217"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56658"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21638"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21753"}],"related":["CVE-2021-22543","CVE-2021-37159","CVE-2021-47634","CVE-2021-47644","CVE-2022-2991","CVE-2022-48636","CVE-2022-48650","CVE-2022-48664","CVE-2022-48953","CVE-2022-48975","CVE-2022-49006","CVE-2022-49076","CVE-2022-49080","CVE-2022-49089","CVE-2022-49124","CVE-2022-49134","CVE-2022-49135","CVE-2022-49151","CVE-2022-49178","CVE-2022-49182","CVE-2022-49201","CVE-2022-49247","CVE-2022-49490","CVE-2022-49626","CVE-2022-49661","CVE-2023-0394","CVE-2023-52572","CVE-2023-52646","CVE-2023-52653","CVE-2023-52853","CVE-2023-52924","CVE-2023-6606","CVE-2024-23307","CVE-2024-26810","CVE-2024-26929","CVE-2024-26930","CVE-2024-26931","CVE-2024-27054","CVE-2024-27388","CVE-2024-27397","CVE-2024-47701","CVE-2024-49867","CVE-2024-49884","CVE-2024-49950","CVE-2024-49963","CVE-2024-49975","CVE-2024-50036","CVE-2024-50067","CVE-2024-50073","CVE-2024-50115","CVE-2024-50251","CVE-2024-50304","CVE-2024-53173","CVE-2024-53217","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56605","CVE-2024-56633","CVE-2024-56647","CVE-2024-56658","CVE-2024-56688","CVE-2024-57896","CVE-2025-21638","CVE-2025-21639","CVE-2025-21640","CVE-2025-21673","CVE-2025-21689","CVE-2025-21690","CVE-2025-21700","CVE-2025-21753"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-22543","CVE-2021-37159","CVE-2021-47634","CVE-2021-47644","CVE-2022-2991","CVE-2022-48636","CVE-2022-48650","CVE-2022-48664","CVE-2022-48953","CVE-2022-48975","CVE-2022-49006","CVE-2022-49076","CVE-2022-49080","CVE-2022-49089","CVE-2022-49124","CVE-2022-49134","CVE-2022-49135","CVE-2022-49151","CVE-2022-49178","CVE-2022-49182","CVE-2022-49201","CVE-2022-49247","CVE-2022-49490","CVE-2022-49626","CVE-2022-49661","CVE-2023-0394","CVE-2023-52572","CVE-2023-52646","CVE-2023-52653","CVE-2023-52853","CVE-2023-52924","CVE-2023-6606","CVE-2024-23307","CVE-2024-26810","CVE-2024-26929","CVE-2024-26930","CVE-2024-26931","CVE-2024-27054","CVE-2024-27388","CVE-2024-27397","CVE-2024-47701","CVE-2024-49867","CVE-2024-49884","CVE-2024-49950","CVE-2024-49963","CVE-2024-49975","CVE-2024-50036","CVE-2024-50067","CVE-2024-50073","CVE-2024-50115","CVE-2024-50251","CVE-2024-50304","CVE-2024-53173","CVE-2024-53217","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56605","CVE-2024-56633","CVE-2024-56647","CVE-2024-56658","CVE-2024-56688","CVE-2024-57896","CVE-2025-21638","CVE-2025-21639","CVE-2025-21640","CVE-2025-21673","CVE-2025-21689","CVE-2025-21690","CVE-2025-21700","CVE-2025-21753"]}