{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.211.1","kernel-source-rt":"5.3.18-150300.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.211.1","kernel-source-rt":"5.3.18-150300.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.211.1","kernel-source-rt":"5.3.18-150300.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.211.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.211.1","kernel-source-rt":"5.3.18-150300.211.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.211.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).\n- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).\n- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).\n- CVE-2022-49769: gfs2: Check sb_bsize_shift after reading superblock (bsc#1242440).\n- CVE-2022-49770: ceph: avoid putting the realm twice when decoding snaps fails (bsc#1242597).\n- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).\n- CVE-2022-49789: scsi: zfcp: Fix double free of FSF request when qdio send fails (bsc#1242366).\n- CVE-2023-53039: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (bsc#1242745).\n- CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1234887).\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).\n- CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).\n- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).\n- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).\n\nThe following non-security bugs were fixed:\n\n- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (bsc#1242745).\n- devm-helpers: Add resource managed version of work init (bsc#1242745).\n- mtd: phram: Add the kernel lock down check (bsc#1232649).\n- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).\n- workqueue: Add resource managed version of delayed work init (bsc#1242745).\n- Remove debug flavor (bsc#1243919).\n","id":"SUSE-SU-2025:01995-1","modified":"2025-06-18T08:34:45Z","published":"2025-06-18T08:34:45Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501995-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1156395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1170891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201672"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201676"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224841"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224882"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225411"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242215"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242352"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242378"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242385"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242391"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242455"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242542"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242551"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242597"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242736"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47260"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47511"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49799"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49832"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-47233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52508"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52654"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37789"}],"related":["CVE-2020-36790","CVE-2020-36791","CVE-2021-32399","CVE-2021-3743","CVE-2021-47100","CVE-2021-47220","CVE-2021-47229","CVE-2021-47231","CVE-2021-47236","CVE-2021-47239","CVE-2021-47240","CVE-2021-47246","CVE-2021-47252","CVE-2021-47255","CVE-2021-47260","CVE-2021-47288","CVE-2021-47296","CVE-2021-47314","CVE-2021-47315","CVE-2021-47485","CVE-2021-47500","CVE-2021-47511","CVE-2022-3564","CVE-2022-48704","CVE-2022-49110","CVE-2022-49139","CVE-2022-49767","CVE-2022-49769","CVE-2022-49770","CVE-2022-49771","CVE-2022-49772","CVE-2022-49775","CVE-2022-49777","CVE-2022-49787","CVE-2022-49788","CVE-2022-49789","CVE-2022-49790","CVE-2022-49793","CVE-2022-49794","CVE-2022-49799","CVE-2022-49802","CVE-2022-49809","CVE-2022-49818","CVE-2022-49821","CVE-2022-49823","CVE-2022-49824","CVE-2022-49825","CVE-2022-49826","CVE-2022-49827","CVE-2022-49830","CVE-2022-49832","CVE-2022-49835","CVE-2022-49836","CVE-2022-49839","CVE-2022-49841","CVE-2022-49842","CVE-2022-49846","CVE-2022-49861","CVE-2022-49870","CVE-2022-49879","CVE-2022-49880","CVE-2022-49881","CVE-2022-49887","CVE-2022-49889","CVE-2022-49892","CVE-2022-49906","CVE-2022-49910","CVE-2022-49915","CVE-2022-49922","CVE-2022-49927","CVE-2023-0160","CVE-2023-1990","CVE-2023-47233","CVE-2023-52508","CVE-2023-52591","CVE-2023-52654","CVE-2023-53039","CVE-2023-53052","CVE-2023-53106","CVE-2023-6531","CVE-2024-35811","CVE-2024-35895","CVE-2024-35914","CVE-2024-46814","CVE-2024-53168","CVE-2024-56558","CVE-2025-21812","CVE-2025-21999","CVE-2025-37789"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2020-36790","CVE-2020-36791","CVE-2021-32399","CVE-2021-3743","CVE-2021-47100","CVE-2021-47220","CVE-2021-47229","CVE-2021-47231","CVE-2021-47236","CVE-2021-47239","CVE-2021-47240","CVE-2021-47246","CVE-2021-47252","CVE-2021-47255","CVE-2021-47260","CVE-2021-47288","CVE-2021-47296","CVE-2021-47314","CVE-2021-47315","CVE-2021-47485","CVE-2021-47500","CVE-2021-47511","CVE-2022-3564","CVE-2022-48704","CVE-2022-49110","CVE-2022-49139","CVE-2022-49767","CVE-2022-49769","CVE-2022-49770","CVE-2022-49771","CVE-2022-49772","CVE-2022-49775","CVE-2022-49777","CVE-2022-49787","CVE-2022-49788","CVE-2022-49789","CVE-2022-49790","CVE-2022-49793","CVE-2022-49794","CVE-2022-49799","CVE-2022-49802","CVE-2022-49809","CVE-2022-49818","CVE-2022-49821","CVE-2022-49823","CVE-2022-49824","CVE-2022-49825","CVE-2022-49826","CVE-2022-49827","CVE-2022-49830","CVE-2022-49832","CVE-2022-49835","CVE-2022-49836","CVE-2022-49839","CVE-2022-49841","CVE-2022-49842","CVE-2022-49846","CVE-2022-49861","CVE-2022-49870","CVE-2022-49879","CVE-2022-49880","CVE-2022-49881","CVE-2022-49887","CVE-2022-49889","CVE-2022-49892","CVE-2022-49906","CVE-2022-49910","CVE-2022-49915","CVE-2022-49922","CVE-2022-49927","CVE-2023-0160","CVE-2023-1990","CVE-2023-47233","CVE-2023-52508","CVE-2023-52591","CVE-2023-52654","CVE-2023-53039","CVE-2023-53052","CVE-2023-53106","CVE-2023-6531","CVE-2024-35811","CVE-2024-35895","CVE-2024-35914","CVE-2024-46814","CVE-2024-53168","CVE-2024-56558","CVE-2025-21812","CVE-2025-21999","CVE-2025-37789"]}