{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.272.1","kernel-default-kgraft-devel":"4.12.14-122.272.1","kgraft-patch-4_12_14-122_272-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.272.1","kernel-default-kgraft-devel":"4.12.14-122.272.1","kgraft-patch-4_12_14-122_272-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_72","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_72&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.272.1","dlm-kmp-default":"4.12.14-122.272.1","gfs2-kmp-default":"4.12.14-122.272.1","kernel-default":"4.12.14-122.272.1","kernel-default-base":"4.12.14-122.272.1","kernel-default-devel":"4.12.14-122.272.1","kernel-default-man":"4.12.14-122.272.1","kernel-devel":"4.12.14-122.272.1","kernel-macros":"4.12.14-122.272.1","kernel-source":"4.12.14-122.272.1","kernel-syms":"4.12.14-122.272.1","ocfs2-kmp-default":"4.12.14-122.272.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.272.1","dlm-kmp-default":"4.12.14-122.272.1","gfs2-kmp-default":"4.12.14-122.272.1","kernel-default":"4.12.14-122.272.1","kernel-default-base":"4.12.14-122.272.1","kernel-default-devel":"4.12.14-122.272.1","kernel-default-man":"4.12.14-122.272.1","kernel-devel":"4.12.14-122.272.1","kernel-macros":"4.12.14-122.272.1","kernel-source":"4.12.14-122.272.1","kernel-syms":"4.12.14-122.272.1","ocfs2-kmp-default":"4.12.14-122.272.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.272.1","dlm-kmp-default":"4.12.14-122.272.1","gfs2-kmp-default":"4.12.14-122.272.1","kernel-default":"4.12.14-122.272.1","kernel-default-base":"4.12.14-122.272.1","kernel-default-devel":"4.12.14-122.272.1","kernel-default-man":"4.12.14-122.272.1","kernel-devel":"4.12.14-122.272.1","kernel-macros":"4.12.14-122.272.1","kernel-source":"4.12.14-122.272.1","kernel-syms":"4.12.14-122.272.1","ocfs2-kmp-default":"4.12.14-122.272.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.272.1","dlm-kmp-default":"4.12.14-122.272.1","gfs2-kmp-default":"4.12.14-122.272.1","kernel-default":"4.12.14-122.272.1","kernel-default-base":"4.12.14-122.272.1","kernel-default-devel":"4.12.14-122.272.1","kernel-devel":"4.12.14-122.272.1","kernel-macros":"4.12.14-122.272.1","kernel-source":"4.12.14-122.272.1","kernel-syms":"4.12.14-122.272.1","ocfs2-kmp-default":"4.12.14-122.272.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.272.1","dlm-kmp-default":"4.12.14-122.272.1","gfs2-kmp-default":"4.12.14-122.272.1","kernel-default":"4.12.14-122.272.1","kernel-default-base":"4.12.14-122.272.1","kernel-default-devel":"4.12.14-122.272.1","kernel-devel":"4.12.14-122.272.1","kernel-macros":"4.12.14-122.272.1","kernel-source":"4.12.14-122.272.1","kernel-syms":"4.12.14-122.272.1","ocfs2-kmp-default":"4.12.14-122.272.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.272.1","dlm-kmp-default":"4.12.14-122.272.1","gfs2-kmp-default":"4.12.14-122.272.1","kernel-default":"4.12.14-122.272.1","kernel-default-base":"4.12.14-122.272.1","kernel-default-devel":"4.12.14-122.272.1","kernel-devel":"4.12.14-122.272.1","kernel-macros":"4.12.14-122.272.1","kernel-source":"4.12.14-122.272.1","kernel-syms":"4.12.14-122.272.1","ocfs2-kmp-default":"4.12.14-122.272.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.272.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-49967: bpf: Fix a data-race around bpf_jit_limit (bsc#1244964).\n- CVE-2022-49975: bpf: Don't redirect packets with invalid pkt_len (bsc#1245196).\n- CVE-2022-49980: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver (bsc#1245110).\n- CVE-2022-49981: HID: hidraw: fix memory leak in hidraw_release() (bsc#1245072).\n- CVE-2022-50007: xfrm: fix refcount leak in __xfrm_policy_check() (bsc#1245016).\n- CVE-2022-50066: net: atlantic: fix aq_vec index out of range error (bsc#1244985).\n- CVE-2022-50080: tee: add overflow check in register_shm_helper() (bsc#1244972).\n- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).\n- CVE-2022-50127: RDMA/rxe: Fix error unwind in rxe_create_qp() (bsc#1244815).\n- CVE-2022-50138: RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (bsc#1244797).\n- CVE-2022-50141: mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (bsc#1244794).\n- CVE-2022-50162: wifi: libertas: Fix possible refcount leak in if_usb_probe() (bsc#1244773).\n- CVE-2022-50185: drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (bsc#1244887).\n- CVE-2022-50191: regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (bsc#1244899).\n- CVE-2022-50228: KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (bsc#1244854).\n- CVE-2022-50229: ALSA: bcd2000: Fix a UAF bug on the error path of probing (bsc#1244856).\n- CVE-2023-52813: crypto: pcrypt - Fix hungtask for PADATA_RESET (bsc#1225527).\n- CVE-2023-53020: l2tp: close all race conditions in l2tp_tunnel_register() (bsc#1240224).\n- CVE-2024-28956: x86/its: Enable Indirect Target Selection mitigation (bsc#1242006).\n- CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292).\n- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).\n- CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734).\n- CVE-2025-38102: VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify (bsc#1245669).\n- CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663).\n- CVE-2025-38117: Bluetooth: MGMT: protect mgmt_pending list with its own lock (bsc#1245695).\n- CVE-2025-38122: gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO (bsc#1245746).\n- CVE-2025-38153: net: usb: aqc111: fix error handling of usbnet read calls (bsc#1245744).\n- CVE-2025-38173: crypto: marvell/cesa - Handle zero-length skcipher requests (bsc#1245769).\n- CVE-2025-38174: thunderbolt: Do not double dequeue a configuration request (bsc#1245781).\n- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).\n- CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012).\n- CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973).\n- CVE-2025-38214: fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (bsc#1246042).\n- CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193).\n- CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).\n- CVE-2025-38313: bus: fsl-mc: fix double-free on mc_dev (bsc#1246342).\n- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).\n- CVE-2025-38386: ACPICA: Refuse to evaluate a method if arguments are missing (bsc#1247138).\n- CVE-2025-38424: perf: Fix sample vs do_exit() (bsc#1246547 bsc#1247293).\n- CVE-2025-38430: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request (bsc#1247160).\n- CVE-2025-38449: drm/gem: Acquire references on GEM handles for framebuffers (bsc#1247255).\n- CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098).\n- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).\n- CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).\n- CVE-2025-38465: netlink: Fix wraparounds of sk->sk_rmem_alloc (bsc#1247118).\n- CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288).\n- CVE-2025-38473: Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() (bsc#1247289).\n- CVE-2025-38474: usb: net: sierra: check for no status endpoint (bsc#1247311).\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).\n- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).\n- CVE-2025-38512: wifi: prevent A-MSDU attacks in mesh networks (bsc#1248178).\n- CVE-2025-38513: wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() (bsc#1248179).\n- CVE-2025-38515: drm/sched: Increment job count before swapping tail spsc queue (bsc#1248212).\n- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).\n- CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296).\n- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).\n- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).\n- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).\n- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).\n\nThe following non-security bugs were fixed:\n\n- Disable N_GSM (jsc#PED-8240).\n- Fix crash caused by backport of 'ext4: fix race when reusing xattr blocks' (bsc#1247929).\n- HID: hidraw: fix a problem of memory leak in hidraw_release() (bsc#1245072).\n- crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (bsc#1225527).\n- drm/framebuffer: Acquire internal references on GEM handles (bsc#1247255).\n- drm/framebuffer: Fix the locking in drm_gem_fb_destroy() (bsc#1248130).\n- linkage: Introduce new macros for assembler symbols (git-fixes).\n- net: usb: aqc111: debug info before sanitation (bsc#1245744).\n- x86/alternative: Merge include files (git-fixes).\n- x86/alternatives: Add an ALTERNATIVE_3() macro (git-fixes).\n- x86/alternatives: Add macro comments (git-fixes).\n- x86/alternatives: Print containing function (git-fixes).\n- x86/asm: Provide ALTERNATIVE_3 (git-fixes).\n- x86: Simplify retpoline declaration (git-fixes).\n","id":"SUSE-SU-2025:03204-1","modified":"2025-09-12T13:40:30Z","published":"2025-09-12T13:40:30Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202503204-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242782"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244794"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244972"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245110"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245695"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247118"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247288"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247289"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247311"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248212"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248296"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-28956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38075"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38174"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38190"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38245"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38263"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38386"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38424"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38430"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38449"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38457"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38460"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38464"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38473"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38474"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38499"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38512"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38513"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38515"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38556"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38565"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38618"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38644"}],"related":["CVE-2022-49967","CVE-2022-49975","CVE-2022-49980","CVE-2022-49981","CVE-2022-50007","CVE-2022-50066","CVE-2022-50080","CVE-2022-50116","CVE-2022-50127","CVE-2022-50138","CVE-2022-50141","CVE-2022-50162","CVE-2022-50185","CVE-2022-50191","CVE-2022-50228","CVE-2022-50229","CVE-2023-52813","CVE-2023-53020","CVE-2024-28956","CVE-2025-22022","CVE-2025-23141","CVE-2025-38075","CVE-2025-38102","CVE-2025-38103","CVE-2025-38117","CVE-2025-38122","CVE-2025-38153","CVE-2025-38173","CVE-2025-38174","CVE-2025-38184","CVE-2025-38185","CVE-2025-38190","CVE-2025-38214","CVE-2025-38245","CVE-2025-38263","CVE-2025-38313","CVE-2025-38352","CVE-2025-38386","CVE-2025-38424","CVE-2025-38430","CVE-2025-38449","CVE-2025-38457","CVE-2025-38460","CVE-2025-38464","CVE-2025-38465","CVE-2025-38470","CVE-2025-38473","CVE-2025-38474","CVE-2025-38498","CVE-2025-38499","CVE-2025-38512","CVE-2025-38513","CVE-2025-38515","CVE-2025-38546","CVE-2025-38556","CVE-2025-38563","CVE-2025-38565","CVE-2025-38617","CVE-2025-38618","CVE-2025-38644"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-49967","CVE-2022-49975","CVE-2022-49980","CVE-2022-49981","CVE-2022-50007","CVE-2022-50066","CVE-2022-50080","CVE-2022-50116","CVE-2022-50127","CVE-2022-50138","CVE-2022-50141","CVE-2022-50162","CVE-2022-50185","CVE-2022-50191","CVE-2022-50228","CVE-2022-50229","CVE-2023-52813","CVE-2023-53020","CVE-2024-28956","CVE-2025-22022","CVE-2025-23141","CVE-2025-38075","CVE-2025-38102","CVE-2025-38103","CVE-2025-38117","CVE-2025-38122","CVE-2025-38153","CVE-2025-38173","CVE-2025-38174","CVE-2025-38184","CVE-2025-38185","CVE-2025-38190","CVE-2025-38214","CVE-2025-38245","CVE-2025-38263","CVE-2025-38313","CVE-2025-38352","CVE-2025-38386","CVE-2025-38424","CVE-2025-38430","CVE-2025-38449","CVE-2025-38457","CVE-2025-38460","CVE-2025-38464","CVE-2025-38465","CVE-2025-38470","CVE-2025-38473","CVE-2025-38474","CVE-2025-38498","CVE-2025-38499","CVE-2025-38512","CVE-2025-38513","CVE-2025-38515","CVE-2025-38546","CVE-2025-38556","CVE-2025-38563","CVE-2025-38565","CVE-2025-38617","CVE-2025-38618","CVE-2025-38644"]}