{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-150700_7_31-rt":"1-150700.1.3.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP7","name":"kernel-livepatch-SLE15-SP7-RT_Update_9","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP7-RT_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150700.1.3.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.31.2","dlm-kmp-rt":"6.4.0-150700.7.31.2","gfs2-kmp-rt":"6.4.0-150700.7.31.2","kernel-devel-rt":"6.4.0-150700.7.31.1","kernel-rt":"6.4.0-150700.7.31.2","kernel-rt-devel":"6.4.0-150700.7.31.2","kernel-source-rt":"6.4.0-150700.7.31.1","kernel-syms-rt":"6.4.0-150700.7.31.1","ocfs2-kmp-rt":"6.4.0-150700.7.31.2"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.31.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.31.2","dlm-kmp-rt":"6.4.0-150700.7.31.2","gfs2-kmp-rt":"6.4.0-150700.7.31.2","kernel-devel-rt":"6.4.0-150700.7.31.1","kernel-rt":"6.4.0-150700.7.31.2","kernel-rt-devel":"6.4.0-150700.7.31.2","kernel-source-rt":"6.4.0-150700.7.31.1","kernel-syms-rt":"6.4.0-150700.7.31.1","ocfs2-kmp-rt":"6.4.0-150700.7.31.2"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.31.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.31.2","dlm-kmp-rt":"6.4.0-150700.7.31.2","gfs2-kmp-rt":"6.4.0-150700.7.31.2","kernel-devel-rt":"6.4.0-150700.7.31.1","kernel-rt":"6.4.0-150700.7.31.2","kernel-rt-devel":"6.4.0-150700.7.31.2","kernel-source-rt":"6.4.0-150700.7.31.1","kernel-syms-rt":"6.4.0-150700.7.31.1","ocfs2-kmp-rt":"6.4.0-150700.7.31.2"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.31.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP7 RT kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-54013: interconnect: Fix locking for runpm vs reclaim (bsc#1256280).\n- CVE-2025-39880: libceph: fix invalid accesses to ceph_connection_v1_info (bsc#1250388).\n- CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).\n- CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852).\n- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).\n- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).\n- CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).\n- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).\n- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).\n- CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260).\n- CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261).\n- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).\n- CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).\n- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327).\n- CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266).\n- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).\n- CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).\n- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226).\n- CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).\n- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).\n- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).\n- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).\n- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).\n- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).\n- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).\n- CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403).\n- CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120).\n- CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).\n- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417).\n- CVE-2025-68327: usb: renesas_usbhs: Fix synchronous external abort on unbind (bsc#1255488).\n- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).\n- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).\n- CVE-2025-68363: bpf: Check skb->transport_header is set in bpf_skb_check_mtu (bsc#1255552).\n- CVE-2025-68365: fs/ntfs3: Initialize allocated memory before use (bsc#1255548).\n- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).\n- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).\n- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).\n- CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure (bsc#1255695).\n- CVE-2025-68727: ntfs3: Fix uninit buffer allocated by __getname() (bsc#1255568).\n- CVE-2025-68728: ntfs3: fix uninit memory after failed mi_read in mi_format_new (bsc#1255539).\n- CVE-2025-68733: smack: fix bug: unprivileged task can create labels (bsc#1255615).\n- CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930).\n- CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).\n- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).\n- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).\n- CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665).\n- CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659).\n- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).\n- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).\n- CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689).\n- CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646).\n- CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653).\n- CVE-2025-68803: nfsd: set security label during create operations (bsc#1256770).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651).\n- CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680).\n- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).\n- CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754).\n- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).\n- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n  (bsc#1256645).\n- CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).\n- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608).\n- CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622).\n- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).\n- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).\n- CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).\n- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).\n- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).\n- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).\n- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597).\n- CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605).\n- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).\n- CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607).\n- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).\n- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).\n- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n- CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757).\n- CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733).\n- CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761).\n- CVE-2025-71137: octeontx2-pf: fix 'UBSAN: shift-out-of-bounds error' (bsc#1256760).\n- CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164).\n- CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167).\n- CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168).\n- CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035).\n- CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053).\n- CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217).\n- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).\n- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).\n- CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218).\n- CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180).\n- CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).\n- CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234).\n- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).\n- CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245).\n- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).\n\nThe following non security issues were fixed:\n\n- ALSA: ctxfi: Fix potential OOB access in audio mixer handling (stable-fixes).\n- ALSA: scarlett2: Fix buffer overflow in config retrieval (git-fixes).\n- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (git-fixes).\n- ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).\n- ALSA: usb: Increase volume range that triggers a warning (git-fixes).\n- ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion (git-fixes).\n- ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 (stable-fixes).\n- ASoC: codecs: wsa881x: Drop unused version readout (stable-fixes).\n- ASoC: codecs: wsa881x: fix unnecessary initialisation (git-fixes).\n- ASoC: codecs: wsa883x: fix unnecessary initialisation (git-fixes).\n- ASoC: codecs: wsa884x: fix codec initialisation (git-fixes).\n- ASoC: fsl: imx-card: Do not force slot width to sample width (git-fixes).\n- ASoC: fsl_sai: Add missing registers to cache default (stable-fixes).\n- ASoC: tlv320adcx140: fix null pointer (git-fixes).\n- ASoC: tlv320adcx140: fix word length (git-fixes).\n- Bluetooth: MGMT: Fix memory leak in set_ssp_complete (git-fixes).\n- Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work (git-fixes).\n- HID: usbhid: paper over wrong bNumDescriptor field (stable-fixes).\n- Input: i8042 - add quirk for ASUS Zenbook UX425QA_UM425QA (stable-fixes).\n- Input: i8042 - add quirks for MECHREVO Wujie 15X Pro (stable-fixes).\n- NFS: Fix up the automount fs_context to use the correct cred (git-fixes).\n- NFSD/blocklayout: Fix minlength check in proc_layoutget (git-fixes).\n- NFSD: Fix permission check for read access to executable-only files (git-fixes).\n- NFSD: use correct reservation type in nfsd4_scsi_fence_client (git-fixes).\n- NFSv4: ensure the open stateid seqid doesn't go backwards (git-fixes).\n- RDMA/mana_ib: Access remote atomic for MRs (git-fixes).\n- RDMA/mana_ib: Add device statistics support (git-fixes).\n- RDMA/mana_ib: Add port statistics support (git-fixes).\n- RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).\n- RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).\n- RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).\n- RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).\n- RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).\n- RDMA/mana_ib: Extend modify QP (git-fixes).\n- RDMA/mana_ib: Fix error code in probe() (git-fixes).\n- RDMA/mana_ib: Fix integer overflow during queue creation (git-fixes).\n- RDMA/mana_ib: Handle net event for pointing to the current netdev (bsc#1256690).\n- RDMA/mana_ib: Implement DMABUF MR support (git-fixes).\n- RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).\n- RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).\n- RDMA/mana_ib: UD/GSI work requests (git-fixes).\n- RDMA/mana_ib: Use safer allocation function() (git-fixes).\n- RDMA/mana_ib: add additional port counters (git-fixes).\n- RDMA/mana_ib: add support of multiple ports (git-fixes).\n- RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).\n- RDMA/mana_ib: create kernel-level CQs (git-fixes).\n- RDMA/mana_ib: create/destroy AH (git-fixes).\n- RDMA/mana_ib: extend mana QP table (git-fixes).\n- RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).\n- RDMA/mana_ib: implement get_dma_mr (git-fixes).\n- RDMA/mana_ib: implement req_notify_cq (git-fixes).\n- RDMA/mana_ib: indicate CM support (git-fixes).\n- RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).\n- RDMA/mana_ib: request error CQEs when supported (git-fixes).\n- RDMA/mana_ib: support of the zero based MRs (git-fixes).\n- RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-fixes).\n- Revert 'nfc/nci: Add the inconsistency check between the input data length and count' (git-fixes).\n- USB: OHCI/UHCI: Add soft dependencies on ehci_platform (stable-fixes).\n- USB: serial: ftdi_sio: add support for PICAXE AXE027 cable (stable-fixes).\n- USB: serial: option: add Telit LE910 MBIM composition (stable-fixes).\n- ata: libata: Add cpr_log to ata_dev_print_features() early return (git-fixes).\n- bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603).\n- bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569).\n- bs-upload-kernel: Fix cve branch uploads.\n- btrfs: do not strictly require dirty metadata threshold for metadata writepages (stable-fixes).\n- can: ctucanfd: fix SSP_SRC in cases when bit-rate is higher than 1 MBit (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: etas_es58x: allow partial RX URB allocation to succeed (git-fixes).\n- can: gs_usb: gs_usb_receive_bulk_callback(): fix error message (git-fixes).\n- can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error (git-fixes).\n- can: j1939: make j1939_session_activate() fail if device is no longer registered (stable-fixes).\n- can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak (git-fixes).\n- can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak (git-fixes).\n- cifs: Fix copy offload to flush destination region (bsc#1252511).\n- cifs: Fix flushing, invalidation and file size with copy_file_range() (bsc#1252511).\n- cifs: add new field to track the last access time of cfid (git-fixes).\n- cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).\n- cifs: avoid redundant calls to disable multichannel (git-fixes).\n- cifs: cifs_pick_channel should try selecting active channels (git-fixes).\n- cifs: deal with the channel loading lag while picking channels (git-fixes).\n- cifs: dns resolution is needed only for primary channel (git-fixes).\n- cifs: do not disable interface polling on failure (git-fixes).\n- cifs: do not search for channel if server is terminating (git-fixes).\n- cifs: fix a pending undercount of srv_count (git-fixes).\n- cifs: fix lock ordering while disabling multichannel (git-fixes).\n- cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).\n- cifs: fix use after free for iface while disabling secondary channels (git-fixes).\n- cifs: handle servers that still advertise multichannel after disabling (git-fixes).\n- cifs: handle when server starts supporting multichannel (git-fixes).\n- cifs: handle when server stops supporting multichannel (git-fixes).\n- cifs: make cifs_chan_update_iface() a void function (git-fixes).\n- cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).\n- cifs: make sure that channel scaling is done only once (git-fixes).\n- cifs: reconnect worker should take reference on server struct unconditionally (git-fixes).\n- cifs: reset connections for all channels when reconnect requested (git-fixes).\n- cifs: reset iface weights when we cannot find a candidate (git-fixes).\n- cifs: serialize other channels when query server interfaces is pending (git-fixes).\n- cifs: update dstaddr whenever channel iface is updated (git-fixes).\n- comedi: Fix getting range information for subdevices 16 to 255 (git-fixes).\n- comedi: dmm32at: serialize use of paged registers (git-fixes).\n- comedi: fix divide-by-zero in comedi_buf_munge() (stable-fixes).\n- cpuset: fix warning when disabling remote partition (bsc#1256794).\n- crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (git-fixes).\n- dmaengine: apple-admac: Add 'apple,t8103-admac' compatible (git-fixes).\n- dmaengine: at_hdmac: fix device leak on of_dma_xlate() (git-fixes).\n- dmaengine: bcm-sba-raid: fix device leak on probe (git-fixes).\n- dmaengine: dw: dmamux: fix OF node leak on route allocation failure (git-fixes).\n- dmaengine: idxd: fix device leaks on compat bind and unbind (git-fixes).\n- dmaengine: lpc18xx-dmamux: fix device leak on route allocation (git-fixes).\n- dmaengine: omap-dma: fix dma_pool resource leak in error paths (git-fixes).\n- dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() (git-fixes).\n- dmaengine: sh: rz-dmac: Fix rz_dmac_terminate_all() (git-fixes).\n- dmaengine: tegra-adma: Fix use-after-free (git-fixes).\n- dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation (git-fixes).\n- dmaengine: ti: dma-crossbar: fix device leak on dra7x route allocation (git-fixes).\n- dmaengine: ti: k3-udma: fix device leak on udma lookup (git-fixes).\n- dmaengine: xilinx: xdma: Fix regmap max_register (git-fixes).\n- dmaengine: xilinx_dma: Fix uninitialized addr_width when 'xlnx,addrwidth' property is missing (git-fixes).\n- dpll: Prevent duplicate registrations (git-fixes).\n- dpll: fix device-id-get and pin-id-get to return errors properly (git-fixes).\n- dpll: fix return value check for kmemdup (git-fixes).\n- dpll: indent DPLL option type by a tab (git-fixes).\n- dpll: spec: add missing module-name and clock-id to pin-get reply (git-fixes).\n- drm/amd/display: Apply e4479aecf658 to dml (stable-fixes).\n- drm/amd/display: Bump the HDMI clock to 340MHz (stable-fixes).\n- drm/amd/display: Fix DP no audio issue (stable-fixes).\n- drm/amd/display: Initialise backlight level values from hw (git-fixes).\n- drm/amd/display: Respect user's CONFIG_FRAME_WARN more for dml files (stable-fixes).\n- drm/amd/display: shrink struct members (stable-fixes).\n- drm/amd/pm: Don't clear SI SMC table when setting power limit (git-fixes).\n- drm/amd/pm: Workaround SI powertune issue on Radeon 430 (v2) (git-fixes).\n- drm/amd/pm: fix race in power state check before mutex lock (git-fixes).\n- drm/amd/pm: fix smu overdrive data type wrong issue on smu 14.0.2 (git-fixes).\n- drm/amd: Clean up kfd node on surprise disconnect (stable-fixes).\n- drm/amdgpu: Fix cond_exec handling in amdgpu_ib_schedule() (git-fixes).\n- drm/amdgpu: Fix query for VPE block_type and ip_count (stable-fixes).\n- drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove (git-fixes).\n- drm/amdgpu: remove frame cntl for gfx v12 (stable-fixes).\n- drm/amdkfd: Fix improper NULL termination of queue restore SMI event string (stable-fixes).\n- drm/amdkfd: fix a memory leak in device_queue_manager_init() (git-fixes).\n- drm/imagination: Wait for FW trace update command completion (git-fixes).\n- drm/imx/tve: fix probe device leak (git-fixes).\n- drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).\n- drm/nouveau/disp/nv50-: Set lock_core in curs507a_prepare (git-fixes).\n- drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit) (stable-fixes).\n- drm/nouveau: add missing DCB connector types (git-fixes).\n- drm/nouveau: implement missing DCB connector types; gracefully handle unknown connectors (git-fixes).\n- drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel (git-fixes).\n- drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] (stable-fixes).\n- drm/vmwgfx: Fix an error return check in vmw_compat_shader_add() (git-fixes).\n- drm/vmwgfx: Merge vmw_bo_release and vmw_bo_free functions (git-fixes).\n- exfat: check return value of sb_min_blocksize in exfat_read_boot_sector (git-fixes).\n- exfat: fix remount failure in different process environments (git-fixes).\n- gpio: omap: do not register driver in probe() (git-fixes).\n- gpio: pca953x: Add support for level-triggered interrupts (stable-fixes).\n- gpio: pca953x: Utilise dev_err_probe() where it makes sense (stable-fixes).\n- gpio: pca953x: Utilise temporary variable for struct device (stable-fixes).\n- gpio: pca953x: fix wrong error probe return value (git-fixes).\n- gpio: pca953x: handle short interrupt pulses on PCAL devices (git-fixes).\n- gpio: rockchip: Stop calling pinctrl for set_direction (git-fixes).\n- ice: use netif_get_num_default_rss_queues() (bsc#1247712).\n- iio: accel: iis328dq: fix gain values (git-fixes).\n- iio: adc: ad7280a: handle spi_setup() errors in probe() (git-fixes).\n- iio: adc: ad9467: fix ad9434 vref mask (git-fixes).\n- iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver (git-fixes).\n- iio: dac: ad5686: add AD5695R to ad5686_chip_info_tbl (git-fixes).\n- iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection (git-fixes).\n- intel_th: fix device leak on output open() (git-fixes).\n- leds: led-class: Only Add LED to leds_list when it is fully ready (git-fixes).\n- lib/crypto: aes: Fix missing MMU protection for AES S-box (git-fixes).\n- mISDN: annotate data-race around dev->work (git-fixes).\n- mei: me: add nova lake point S DID (stable-fixes).\n- mei: me: add wildcat lake P DID (stable-fixes).\n- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1253087 bsc#1254447).\n- mmc: rtsx_pci_sdmmc: implement sdmmc_card_busy function (git-fixes).\n- mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode (git-fixes).\n- net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts (git-fixes).\n- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).\n- net: mana: Add metadata support for xdp mode (git-fixes).\n- net: mana: Add standard counter rx_missed_errors (git-fixes).\n- net: mana: Add support for auxiliary device servicing events (git-fixes).\n- net: mana: Change the function signature of mana_get_primary_netdev_rcu (bsc#1256690).\n- net: mana: Drop TX skb on post_work_request failure and unmap resources (git-fixes).\n- net: mana: Fix use-after-free in reset service rescan path (git-fixes).\n- net: mana: Fix warnings for missing export.h header inclusion (git-fixes).\n- net: mana: Handle Reset Request from MANA NIC (git-fixes).\n- net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).\n- net: mana: Handle hardware recovery events when probing the device (git-fixes).\n- net: mana: Handle unsupported HWC commands (git-fixes).\n- net: mana: Move hardware counter stats from per-port to per-VF context (git-fixes).\n- net: mana: Probe rdma device in mana driver (git-fixes).\n- net: mana: Reduce waiting time if HWC not responding (git-fixes).\n- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).\n- net: tcp: allow zero-window ACK update the window (bsc#1254767).\n- net: usb: dm9601: remove broken SR9700 support (git-fixes).\n- net: wwan: t7xx: fix potential skb->frags overflow in RX path (git-fixes).\n- nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame() (git-fixes).\n- nfc: nci: Fix race between rfkill and nci_unregister_device() (git-fixes).\n- nfsd: Drop the client reference in client_states_open() (git-fixes).\n- nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).\n- nvmet-auth: update sc_c in host response (git-fixes).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- of: fix reference count leak in of_alias_scan() (git-fixes).\n- of: platform: Use default match table for /firmware (git-fixes).\n- phy: freescale: imx8m-pcie: assert phy reset during power on (stable-fixes).\n- phy: rockchip: inno-usb2: fix communication disruption in gadget mode (git-fixes).\n- phy: rockchip: inno-usb2: fix disconnection in gadget mode (git-fixes).\n- phy: stm32-usphyc: Fix off by one in probe() (git-fixes).\n- phy: tegra: xusb: Explicitly configure HS_DISCON_LEVEL to 0x7 (git-fixes).\n- platform/x86/amd: Fix memory leak in wbrf_record() (git-fixes).\n- platform/x86: hp-bioscfg: Fix automatic module loading (git-fixes).\n- platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro (git-fixes).\n- platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names (git-fixes).\n- pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() (git-fixes).\n- powercap: fix race condition in register_control_type() (stable-fixes).\n- powercap: fix sscanf() error return value handling (stable-fixes).\n- powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).\n- regmap: Fix race condition in hwspinlock irqsave routine (git-fixes).\n- sched/rt: Skip group schedulable check with rt_group_sched=0 (bsc#1256568).\n- sched: Increase sched_tick_remote timeout (bsc#1254510).\n- scripts/python/git_sort/git_sort.yaml: add cifs for-next repository.\n- scripts: obsapi: Support URL trailing / in oscrc.\n- scripts: teaapi: Add paging.\n- scripts: uploader: Fix no change condition for _maintainership.json.\n- scripts: uploader: Handle missing upstream in is_pr_open.\n- scrits: teaapi: Add list_repos.\n- scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256861).\n- scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256861).\n- scsi: qla2xxx: Add Speed in SFP print information (bsc#1256863).\n- scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256863).\n- scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256863).\n- scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256863).\n- scsi: qla2xxx: Allow recovery for tape devices (bsc#1256863).\n- scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256863).\n- scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256863).\n- scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256863).\n- scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256863).\n- scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256863).\n- scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256863).\n- scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256863).\n- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).\n- selftests/bpf: Fix flaky bpf_cookie selftest (git-fixes).\n- selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346).\n- serial: 8250_pci: Fix broken RS485 for F81504/508/512 (git-fixes).\n- slimbus: core: fix OF node leak on registration failure (git-fixes).\n- slimbus: core: fix device reference leak on report present (git-fixes).\n- slimbus: core: fix of_slim_get_device() kernel doc (git-fixes).\n- slimbus: core: fix runtime PM imbalance on report present (git-fixes).\n- smb3: add missing null server pointer check (git-fixes).\n- smb: change return type of cached_dir_lease_break() to bool (git-fixes).\n- smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid (git-fixes).\n- smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).\n- smb: client: fix warning when reconnecting channel (git-fixes).\n- smb: client: introduce close_cached_dir_locked() (git-fixes).\n- smb: client: remove unused fid_lock (git-fixes).\n- smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-fixes).\n- smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748 bsc#1257154).\n- smb: client: update cfid->last_access_time in open_cached_dir_by_dentry() (git-fixes).\n- smb: improve directory cache reuse for readdir operations (bsc#1252712).\n- spi: spi-sprd-adi: Fix double free in probe error path (git-fixes).\n- spi: sprd-adi: switch to use spi_alloc_host() (stable-fixes).\n- spi: sprd: adi: Use devm_register_restart_handler() (stable-fixes).\n- svcrdma: return 0 on success from svc_rdma_copy_inline_range (git-fixes).\n- uacce: ensure safe queue release with state management (git-fixes).\n- uacce: fix cdev handling in the cleanup path (git-fixes).\n- uacce: fix isolate sysfs check condition (git-fixes).\n- uacce: implement mremap in uacce_vm_ops to return -EPERM (git-fixes).\n- usb: core: add USB_QUIRK_NO_BOS for devices that hang on BOS descriptor (stable-fixes).\n- usb: dwc3: Check for USB4 IP_NAME (stable-fixes).\n- usbnet: limit max_mtu based on device's hard_mtu (git-fixes).\n- w1: fix redundant counter decrement in w1_attach_slave_device() (git-fixes).\n- w1: therm: Fix off-by-one buffer overflow in alarms_store (git-fixes).\n- wifi: ath10k: fix dma_free_coherent() pointer (git-fixes).\n- wifi: ath12k: fix dma_free_coherent() pointer (git-fixes).\n- wifi: mac80211: correctly decode TTLM with default link map (git-fixes).\n- wifi: mac80211: don't perform DA check on S1G beacon (git-fixes).\n- wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).\n- wifi: rsi: Fix memory corruption due to not set vif driver data size (git-fixes).\n- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).\n- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).\n- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).\n- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).\n- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).\n- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches\n  (bsc#1256528).\n- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).\n- x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).\n- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).\n- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).\n- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).\n- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).\n- x86: make page fault handling disable interrupts properly (git-fixes).\n","id":"SUSE-SU-2026:0587-1","modified":"2026-02-20T10:04:28Z","published":"2026-02-20T10:04:28Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260587-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223800"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233563"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250388"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252900"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253340"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253451"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254624"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254852"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254871"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255102"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255226"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255261"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255269"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255401"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255403"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255544"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255622"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255695"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256579"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256597"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256606"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256622"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256651"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256654"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256661"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256665"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256674"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256680"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256690"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256741"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256760"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256794"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256863"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257204"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257215"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257234"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257296"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56721"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38243"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40328"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40363"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68174"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68241"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68245"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68256"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68297"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68363"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68366"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68367"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68372"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68795"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68801"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68803"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68820"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71123"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71137"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23011"}],"related":["CVE-2023-53714","CVE-2023-54013","CVE-2024-27005","CVE-2024-42103","CVE-2024-53070","CVE-2024-53149","CVE-2024-56721","CVE-2025-22047","CVE-2025-37744","CVE-2025-37751","CVE-2025-37813","CVE-2025-38209","CVE-2025-38243","CVE-2025-38322","CVE-2025-38379","CVE-2025-38539","CVE-2025-39689","CVE-2025-39813","CVE-2025-39829","CVE-2025-39836","CVE-2025-39880","CVE-2025-39913","CVE-2025-40097","CVE-2025-40106","CVE-2025-40132","CVE-2025-40136","CVE-2025-40142","CVE-2025-40166","CVE-2025-40177","CVE-2025-40181","CVE-2025-40202","CVE-2025-40238","CVE-2025-40254","CVE-2025-40257","CVE-2025-40259","CVE-2025-40261","CVE-2025-40264","CVE-2025-40328","CVE-2025-40350","CVE-2025-40355","CVE-2025-40363","CVE-2025-68171","CVE-2025-68174","CVE-2025-68178","CVE-2025-68188","CVE-2025-68200","CVE-2025-68215","CVE-2025-68227","CVE-2025-68241","CVE-2025-68245","CVE-2025-68254","CVE-2025-68256","CVE-2025-68261","CVE-2025-68284","CVE-2025-68285","CVE-2025-68296","CVE-2025-68297","CVE-2025-68301","CVE-2025-68320","CVE-2025-68325","CVE-2025-68327","CVE-2025-68337","CVE-2025-68349","CVE-2025-68363","CVE-2025-68365","CVE-2025-68366","CVE-2025-68367","CVE-2025-68372","CVE-2025-68379","CVE-2025-68725","CVE-2025-68727","CVE-2025-68728","CVE-2025-68733","CVE-2025-68764","CVE-2025-68768","CVE-2025-68770","CVE-2025-68771","CVE-2025-68773","CVE-2025-68775","CVE-2025-68776","CVE-2025-68777","CVE-2025-68783","CVE-2025-68788","CVE-2025-68789","CVE-2025-68795","CVE-2025-68797","CVE-2025-68798","CVE-2025-68800","CVE-2025-68801","CVE-2025-68802","CVE-2025-68803","CVE-2025-68804","CVE-2025-68808","CVE-2025-68813","CVE-2025-68814","CVE-2025-68815","CVE-2025-68816","CVE-2025-68819","CVE-2025-68820","CVE-2025-71064","CVE-2025-71066","CVE-2025-71076","CVE-2025-71077","CVE-2025-71078","CVE-2025-71079","CVE-2025-71080","CVE-2025-71081","CVE-2025-71082","CVE-2025-71083","CVE-2025-71084","CVE-2025-71085","CVE-2025-71086","CVE-2025-71087","CVE-2025-71088","CVE-2025-71089","CVE-2025-71091","CVE-2025-71093","CVE-2025-71094","CVE-2025-71095","CVE-2025-71096","CVE-2025-71097","CVE-2025-71098","CVE-2025-71099","CVE-2025-71100","CVE-2025-71101","CVE-2025-71108","CVE-2025-71111","CVE-2025-71112","CVE-2025-71114","CVE-2025-71116","CVE-2025-71118","CVE-2025-71119","CVE-2025-71120","CVE-2025-71123","CVE-2025-71130","CVE-2025-71131","CVE-2025-71132","CVE-2025-71133","CVE-2025-71135","CVE-2025-71136","CVE-2025-71137","CVE-2025-71138","CVE-2025-71141","CVE-2025-71142","CVE-2025-71143","CVE-2025-71145","CVE-2025-71147","CVE-2025-71149","CVE-2025-71154","CVE-2025-71156","CVE-2025-71157","CVE-2025-71162","CVE-2025-71163","CVE-2026-22976","CVE-2026-22977","CVE-2026-22978","CVE-2026-22984","CVE-2026-22985","CVE-2026-22988","CVE-2026-22990","CVE-2026-22991","CVE-2026-22992","CVE-2026-22993","CVE-2026-22996","CVE-2026-22997","CVE-2026-22999","CVE-2026-23000","CVE-2026-23001","CVE-2026-23005","CVE-2026-23006","CVE-2026-23011"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-53714","CVE-2023-54013","CVE-2024-27005","CVE-2024-42103","CVE-2024-53070","CVE-2024-53149","CVE-2024-56721","CVE-2025-22047","CVE-2025-37744","CVE-2025-37751","CVE-2025-37813","CVE-2025-38209","CVE-2025-38243","CVE-2025-38322","CVE-2025-38379","CVE-2025-38539","CVE-2025-39689","CVE-2025-39813","CVE-2025-39829","CVE-2025-39836","CVE-2025-39880","CVE-2025-39913","CVE-2025-40097","CVE-2025-40106","CVE-2025-40132","CVE-2025-40136","CVE-2025-40142","CVE-2025-40166","CVE-2025-40177","CVE-2025-40181","CVE-2025-40202","CVE-2025-40238","CVE-2025-40254","CVE-2025-40257","CVE-2025-40259","CVE-2025-40261","CVE-2025-40264","CVE-2025-40328","CVE-2025-40350","CVE-2025-40355","CVE-2025-40363","CVE-2025-68171","CVE-2025-68174","CVE-2025-68178","CVE-2025-68188","CVE-2025-68200","CVE-2025-68215","CVE-2025-68227","CVE-2025-68241","CVE-2025-68245","CVE-2025-68254","CVE-2025-68256","CVE-2025-68261","CVE-2025-68284","CVE-2025-68285","CVE-2025-68296","CVE-2025-68297","CVE-2025-68301","CVE-2025-68320","CVE-2025-68325","CVE-2025-68327","CVE-2025-68337","CVE-2025-68349","CVE-2025-68363","CVE-2025-68365","CVE-2025-68366","CVE-2025-68367","CVE-2025-68372","CVE-2025-68379","CVE-2025-68725","CVE-2025-68727","CVE-2025-68728","CVE-2025-68733","CVE-2025-68764","CVE-2025-68768","CVE-2025-68770","CVE-2025-68771","CVE-2025-68773","CVE-2025-68775","CVE-2025-68776","CVE-2025-68777","CVE-2025-68783","CVE-2025-68788","CVE-2025-68789","CVE-2025-68795","CVE-2025-68797","CVE-2025-68798","CVE-2025-68800","CVE-2025-68801","CVE-2025-68802","CVE-2025-68803","CVE-2025-68804","CVE-2025-68808","CVE-2025-68813","CVE-2025-68814","CVE-2025-68815","CVE-2025-68816","CVE-2025-68819","CVE-2025-68820","CVE-2025-71064","CVE-2025-71066","CVE-2025-71076","CVE-2025-71077","CVE-2025-71078","CVE-2025-71079","CVE-2025-71080","CVE-2025-71081","CVE-2025-71082","CVE-2025-71083","CVE-2025-71084","CVE-2025-71085","CVE-2025-71086","CVE-2025-71087","CVE-2025-71088","CVE-2025-71089","CVE-2025-71091","CVE-2025-71093","CVE-2025-71094","CVE-2025-71095","CVE-2025-71096","CVE-2025-71097","CVE-2025-71098","CVE-2025-71099","CVE-2025-71100","CVE-2025-71101","CVE-2025-71108","CVE-2025-71111","CVE-2025-71112","CVE-2025-71114","CVE-2025-71116","CVE-2025-71118","CVE-2025-71119","CVE-2025-71120","CVE-2025-71123","CVE-2025-71130","CVE-2025-71131","CVE-2025-71132","CVE-2025-71133","CVE-2025-71135","CVE-2025-71136","CVE-2025-71137","CVE-2025-71138","CVE-2025-71141","CVE-2025-71142","CVE-2025-71143","CVE-2025-71145","CVE-2025-71147","CVE-2025-71149","CVE-2025-71154","CVE-2025-71156","CVE-2025-71157","CVE-2025-71162","CVE-2025-71163","CVE-2026-22976","CVE-2026-22977","CVE-2026-22978","CVE-2026-22984","CVE-2026-22985","CVE-2026-22988","CVE-2026-22990","CVE-2026-22991","CVE-2026-22992","CVE-2026-22993","CVE-2026-22996","CVE-2026-22997","CVE-2026-22999","CVE-2026-23000","CVE-2026-23001","CVE-2026-23005","CVE-2026-23006","CVE-2026-23011"]}