{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2025-71234",
        "tracking": {
            "current_release_date": "2026-04-02T22:57:16.049600Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2025-71234",
            "initial_release_date": "2026-01-02T14:27:48.230356Z",
            "revision_history": [
                {
                    "date": "2026-01-02T14:27:48.230356Z",
                    "number": "1",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-02-18T15:38:47.721533Z",
                    "number": "2",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| Products created (3).| Products connected (3).| References created (3)."
                },
                {
                    "date": "2026-02-18T15:38:51.564687Z",
                    "number": "3",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-18T16:27:16.103348Z",
                    "number": "4",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (3)."
                },
                {
                    "date": "2026-02-18T16:27:21.913542Z",
                    "number": "5",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-18T18:43:58.363174Z",
                    "number": "6",
                    "summary": "Source created.| CVE status created. (valid)| Products connected (2)."
                },
                {
                    "date": "2026-02-18T18:44:13.877024Z",
                    "number": "7",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-19T00:59:51.327316Z",
                    "number": "8",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (5)."
                },
                {
                    "date": "2026-02-19T06:43:44.313163Z",
                    "number": "9",
                    "summary": "Description created for source."
                },
                {
                    "date": "2026-02-19T13:06:08.303003Z",
                    "number": "10",
                    "summary": "Source connected.| CVE status created. (valid)| Products connected (1).| References created (36)."
                },
                {
                    "date": "2026-02-19T13:06:11.051354Z",
                    "number": "11",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-19T14:18:03.756207Z",
                    "number": "12",
                    "summary": "Source created.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-02-19T14:18:05.947375Z",
                    "number": "13",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-20T00:27:51.018248Z",
                    "number": "14",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (13).| Product Identifiers created (5).| References created (3).| CWES updated (1).| Vendor_assessment created."
                },
                {
                    "date": "2026-02-20T00:27:55.544772Z",
                    "number": "15",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-23T03:38:53.883718Z",
                    "number": "16",
                    "summary": "Products created (4).| Products connected (3).| Products removed (3).| References created (1)."
                },
                {
                    "date": "2026-02-23T03:39:02.498346Z",
                    "number": "17",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-23T04:24:50.979947Z",
                    "number": "18",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-02-23T18:19:49.604592Z",
                    "number": "19",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (1)."
                },
                {
                    "date": "2026-02-23T18:19:51.905658Z",
                    "number": "20",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-23T18:43:43.318569Z",
                    "number": "21",
                    "summary": "Products connected (2).| Products removed (2)."
                },
                {
                    "date": "2026-02-23T18:43:46.449885Z",
                    "number": "22",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-02-24T00:51:38.845343Z",
                    "number": "23",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-13T08:23:32.634608Z",
                    "number": "24",
                    "summary": "Products connected (1).| References created (2)."
                },
                {
                    "date": "2026-03-13T08:23:34.592129Z",
                    "number": "25",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-16T10:37:25.962278Z",
                    "number": "26",
                    "summary": "References created (2)."
                },
                {
                    "date": "2026-03-18T17:25:58.633673Z",
                    "number": "27",
                    "summary": "CVSS created.| Products connected (3).| Product Identifiers created (3).| CWES updated (1)."
                },
                {
                    "date": "2026-03-18T17:26:01.080379Z",
                    "number": "28",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-19T09:08:07.828976Z",
                    "number": "29",
                    "summary": "Products connected (1).| References created (2)."
                },
                {
                    "date": "2026-03-19T09:08:12.917463Z",
                    "number": "30",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-19T20:08:54.314498Z",
                    "number": "31",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-19T20:08:56.084991Z",
                    "number": "32",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T20:35:45.392186Z",
                    "number": "33",
                    "summary": "Products connected (1).| References created (4)."
                },
                {
                    "date": "2026-03-20T20:35:47.571571Z",
                    "number": "34",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T01:05:57.232149Z",
                    "number": "35",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-25T01:06:15.692633Z",
                    "number": "36",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T10:17:28.698438Z",
                    "number": "37",
                    "summary": "Products connected (1).| References created (4)."
                },
                {
                    "date": "2026-03-25T10:17:33.685848Z",
                    "number": "38",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T22:15:08.294423Z",
                    "number": "39",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| Products connected (4).| References created (270)."
                },
                {
                    "date": "2026-03-25T22:15:15.767034Z",
                    "number": "40",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-26T11:43:57.507473Z",
                    "number": "41",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-27T11:56:09.085212Z",
                    "number": "42",
                    "summary": "References created (2)."
                },
                {
                    "date": "2026-03-27T11:56:11.411085Z",
                    "number": "43",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-27T19:48:55.544531Z",
                    "number": "44",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| Products connected (15).| References created (346)."
                },
                {
                    "date": "2026-03-27T19:49:05.523783Z",
                    "number": "45",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-30T11:11:29.597346Z",
                    "number": "46",
                    "summary": "References created (4)."
                },
                {
                    "date": "2026-03-30T11:11:34.779257Z",
                    "number": "47",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-31T11:08:30.275142Z",
                    "number": "48",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-31T11:08:32.600380Z",
                    "number": "49",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-04-02T12:13:14.730486Z",
                    "number": "50",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-04-02T12:13:17.573155Z",
                    "number": "51",
                    "summary": "NCSC Score updated."
                }
            ],
            "status": "interim",
            "version": "51"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1330296",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:amazon:linux_2:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Amazon Linux 2"
                    }
                ],
                "category": "vendor",
                "name": "Amazon"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1295663",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Debian Linux"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:deb/*",
                                        "product": {
                                            "name": "vers:deb/*",
                                            "product_id": "CSAFPID-2036022"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "linux"
                            }
                        ],
                        "category": "product_family",
                        "name": "bookworm"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:deb/*",
                                        "product": {
                                            "name": "vers:deb/*",
                                            "product_id": "CSAFPID-2036023"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "linux"
                            }
                        ],
                        "category": "product_family",
                        "name": "bullseye"
                    }
                ],
                "category": "vendor",
                "name": "Debian"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<116f7bd8160c6b37d1c6939385abf90f6f6ed2f5",
                                "product": {
                                    "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<116f7bd8160c6b37d1c6939385abf90f6f6ed2f5",
                                    "product_id": "CSAFPID-5669120"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<5d810ba377eddee95d30766d360a14efbb3d1872",
                                "product": {
                                    "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<5d810ba377eddee95d30766d360a14efbb3d1872",
                                    "product_id": "CSAFPID-5669119"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<86c946bcc00f6390ef65e9614ae60a9377e454f8",
                                "product": {
                                    "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<86c946bcc00f6390ef65e9614ae60a9377e454f8",
                                    "product_id": "CSAFPID-5669122"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<9a0f3fa6ecd0c9c32dbc367a57482bbf7c7d25bf",
                                "product": {
                                    "name": "vers:git/eef55f1545c92c7181d5083453dee1296298ad3e|<9a0f3fa6ecd0c9c32dbc367a57482bbf7c7d25bf",
                                    "product_id": "CSAFPID-5669121"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:semver/6.12.72|<=6.12.*",
                                "product": {
                                    "name": "vers:semver/6.12.72|<=6.12.*",
                                    "product_id": "CSAFPID-5618223"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:semver/6.18.11|<=6.18.*",
                                "product": {
                                    "name": "vers:semver/6.18.11|<=6.18.*",
                                    "product_id": "CSAFPID-5629416"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:semver/6.19.1|<=6.19.*",
                                "product": {
                                    "name": "vers:semver/6.19.1|<=6.19.*",
                                    "product_id": "CSAFPID-5629417"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:semver/<6.9",
                                "product": {
                                    "name": "vers:semver/<6.9",
                                    "product_id": "CSAFPID-1286676"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/6.9",
                                "product": {
                                    "name": "vers:unknown/6.9",
                                    "product_id": "CSAFPID-1286675"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/7.0-rc1|<=*",
                                "product": {
                                    "name": "vers:unknown/7.0-rc1|<=*",
                                    "product_id": "CSAFPID-5669083"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Linux"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=6.13|<6.18.11",
                                "product": {
                                    "name": "vers:unknown/>=6.13|<6.18.11",
                                    "product_id": "CSAFPID-5839350",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=6.19|<6.19.1",
                                "product": {
                                    "name": "vers:unknown/>=6.19|<6.19.1",
                                    "product_id": "CSAFPID-5754847",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=6.9|<6.12.72",
                                "product": {
                                    "name": "vers:unknown/>=6.9|<6.12.72",
                                    "product_id": "CSAFPID-5844406",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "linux_kernel"
                    }
                ],
                "category": "vendor",
                "name": "Linux"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1330297",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:open_source:linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Open Source Linux Kernel"
                    }
                ],
                "category": "vendor",
                "name": "Open Source"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317177",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:oracle:linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Oracle Linux"
                    }
                ],
                "category": "vendor",
                "name": "Oracle"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/10",
                                "product": {
                                    "name": "vers:rpm/10",
                                    "product_id": "CSAFPID-2858634",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:10"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 10"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/6",
                                "product": {
                                    "name": "vers:rpm/6",
                                    "product_id": "CSAFPID-1439321",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:6"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 6"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/7",
                                "product": {
                                    "name": "vers:rpm/7",
                                    "product_id": "CSAFPID-1439315",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:7"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 7"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/8",
                                "product": {
                                    "name": "vers:rpm/8",
                                    "product_id": "CSAFPID-1439317",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:enterprise_linux:8"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 8"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/9",
                                "product": {
                                    "name": "vers:rpm/9",
                                    "product_id": "CSAFPID-1439319",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:enterprise_linux:9"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 9"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-2858635"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 10"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453376"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 6"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453377"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453378"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-rt"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453379"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453380"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-rt"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 8"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453381"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1453382"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-rt"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 9"
                    }
                ],
                "category": "vendor",
                "name": "Red Hat"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317174",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:suse:suse_linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SuSE Linux"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943973"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-64kb"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943974"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1.150700.17.23.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1.150700.17.23.1",
                                            "product_id": "CSAFPID-5943975"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default-base"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943976"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-source"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943977"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-zfcpdump"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Module for Basesystem 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943985"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-azure"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Module for Public Cloud 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943986"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise High Availability Extension 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943983"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<1-150700.15.3.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<1-150700.15.3.1",
                                            "product_id": "CSAFPID-5943984"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-livepatch-SLE15-SP7_Update_10"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Live Patching 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943982"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Module for Legacy 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943987"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Workstation Extension 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-40.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-40.1",
                                            "product_id": "CSAFPID-5910478"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-40.1.21.17",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-40.1.21.17",
                                            "product_id": "CSAFPID-5910479"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-default-base"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-40.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-40.1",
                                            "product_id": "CSAFPID-5910480"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-kvmsmall"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-40.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-40.1",
                                            "product_id": "CSAFPID-5910481"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-source"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Micro 6.1"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943978"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-docs"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943979"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-obs-build"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943980"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-source"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<6.4.0-150700.53.34.1",
                                            "product_id": "CSAFPID-5943981"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "kernel-syms"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Module for Development Tools 15 SP7"
                    }
                ],
                "category": "vendor",
                "name": "SUSE"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:microsoft/*",
                                        "product": {
                                            "name": "vers:microsoft/*",
                                            "product_id": "CSAFPID-5674307",
                                            "product_identification_helper": {
                                                "cpe": "cpe:2.3:a:microsoft:azl3_kernel_6.6.121.1-1:*:*:*:*:*:*:*:*"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "azl3 kernel 6.6.121.1-1 on Azure Linux 3.0"
                            }
                        ],
                        "category": "product_family",
                        "name": "Open Source Software"
                    }
                ],
                "category": "vendor",
                "name": "Microsoft"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2025-71234",
            "cwe": {
                "id": "CWE-476",
                "name": "NULL Pointer Dereference"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu\\_sta\\_add",
                    "title": "microsoft - https://api.msrc.microsoft.com/cvrf/v3.0/cvrf/2026-Feb"
                },
                {
                    "category": "description",
                    "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw->sta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta->drv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n  BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n  Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw->sta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw->vif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver's per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
                    "title": "cveprojectv5 - https://www.cve.org/CVERecord?id=CVE-2025-71234"
                },
                {
                    "category": "description",
                    "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw->sta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta->drv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n  BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n  Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw->sta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw->vif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver's per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
                    "title": "nvd - https://nvd.nist.gov/vuln/detail/CVE-2025-71234"
                },
                {
                    "category": "description",
                    "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw->sta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta->drv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n  BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n  Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw->sta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw->vif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver's per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/GIT%2FCVE-2025-71234.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "In the Linux kernel, the following vulnerability has been resolved:  wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add  The driver does not set hw->sta_data_size, which causes mac80211 to allocate insufficient space for driver private station data in __sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of struct rtl8xxxu_sta_info through sta->drv_priv, this results in a slab-out-of-bounds write.  KASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:    BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346   Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12  Set hw->sta_data_size to sizeof(struct rtl8xxxu_sta_info) during probe, similar to how hw->vif_data_size is configured. This ensures mac80211 allocates sufficient space for the driver's per-station private data.  Tested on StarFive VisionFive 2 v1.2A board.",
                    "title": "debian - https://security-tracker.debian.org/tracker/CVE-2025-71234"
                },
                {
                    "category": "description",
                    "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\nThe driver does not set hw->sta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta->drv_priv, this results in a\nslab-out-of-bounds write.\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\nBUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\nWrite of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\nSet hw->sta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw->vif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver's per-station\nprivate data.\nTested on StarFive VisionFive 2 v1.2A board.\nA slab out of bounds write can occur in the rtl8xxxu USB wifi driver because hw sta_data_size is not set and mac80211 allocates insufficient per station private storage for sta drv_priv. When rtl8xxxu_sta_add writes fields of struct rtl8xxxu_sta_info via sta drv_priv it can overwrite adjacent slab memory which can crash the kernel and may corrupt kernel state. For the CVSS the PR is L because the bug is typically triggered by local network configuration actions such as enabling the interface and associating stations and these operations commonly require CAP_NET_ADMIN. In some deployments the attacker may only need to be within wireless range if the device is operating as an access point and accepts associations which can make the trigger effectively remote over the air. Impact is at least denial of service. A conservative worst case also considers confidentiality and integrity impact because the flaw is a kernel memory overwrite.",
                    "title": "redhat - https://access.redhat.com/security/cve/CVE-2025-71234"
                },
                {
                    "category": "description",
                    "text": "\nThe SUSE Linux Enterprise Micro 6.0 and Micro 6.1 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).\n- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).\n- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).\n- CVE-2025-68778: btrfs: don't log conflicting inode if it's a dir moved in the current transaction (bsc#1256683).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).\n- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).\n- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).\n- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n\nThe following non security issues were fixed:\n\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- Update \"drm/mgag200: fix mgag200_bmc_stop_scanout()\" bug number (bsc#1258153)\n- Update upstreamed net and powerpc patch references and sorting\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- landlock: Optimize file path walks and prepare for audit support (bsc#1255698).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952)\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952)\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)\n",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/SUSE%2FSUSE-SU-2026:20667-1.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "\nThe SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).\n- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).\n- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths\n  (bsc#1253455).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).\n- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).\n- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).\n- CVE-2025-68778: btrfs: don't log conflicting inode if it's a dir moved in the current transaction (bsc#1256683).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n  (bsc#1256645).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).\n- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).\n- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).\n- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).\n- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).\n- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).\n- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).\n- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).\n- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs (git-fixes).\n- ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() (git-fixes).\n- ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO (git-fixes).\n- ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4() (stable-fixes).\n- ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP (stable-fixes).\n- ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch() (git-fixes).\n- ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro (stable-fixes).\n- ALSA: hda/realtek - fixed speaker no sound (stable-fixes).\n- ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk (stable-fixes).\n- ALSA: hda/realtek: Add quirk for Inspur S14-G1 (stable-fixes).\n- ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU (stable-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (stable-fixes).\n- ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU (git-fixes).\n- ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio (stable-fixes).\n- ALSA: usb-audio: Add sanity check for OOB writes at silencing (stable-fixes).\n- ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0 (stable-fixes).\n- ALSA: usb-audio: Cap the packet size pre-calculations (git-fixes).\n- ALSA: usb-audio: Check max frame size for implicit feedback mode, too (stable-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices (git-fixes).\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: Use correct version for UAC3 header validation (git-fixes).\n- ALSA: usb-audio: Use inclusive terms (git-fixes).\n- ALSA: vmaster: Relax __free() variable declarations (git-fixes).\n- APEI/GHES: ensure that won't go past CPER allocated record (stable-fixes).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- arm64: Add support for TSV110 Spectre-BHB mitigation (git-fixes).\n- arm64: Disable branch profiling for all arm64 code (git-fixes).\n- arm64: Set __nocfi on swsusp_arch_resume() (git-fixes).\n- ASoC: amd: drop unused Kconfig symbols (git-fixes).\n- ASoC: amd: fix memory leak in acp3x pdm dma ops (git-fixes).\n- ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR (stable-fixes).\n- ASoC: amd: yc: Add quirk for HP 200 G2a 16 (stable-fixes).\n- ASoC: amd: yc: Fix microphone on ASUS M6500RE (stable-fixes).\n- ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in max98390_i2c_probe() (stable-fixes).\n- ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel (stable-fixes).\n- ASoC: cs42l43: Correct handling of 3-pole jack load detection (stable-fixes).\n- ASoC: davinci-evm: Fix reference leak in davinci_evm_probe (stable-fixes).\n- ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 (stable-fixes).\n- ASoC: nau8821: Avoid unnecessary blocking in IRQ handler (stable-fixes).\n- ASoC: nau8821: Cancel delayed work on component remove (git-fixes).\n- ASoC: nau8821: Cancel pending work before suspend (git-fixes).\n- ASoC: nau8821: Consistently clear interrupts before unmasking (git-fixes).\n- ASoC: nau8821: Fixup nau8821_enable_jack_detect() (git-fixes).\n- ASoC: pxa: drop unused Kconfig symbol (git-fixes).\n- ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk (git-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- ASoC: SOF: ipc4-control: Keep the payload size up to date (git-fixes).\n- ASoC: SOF: ipc4-control: Use the correct size for scontrol->ipc_control_data (git-fixes).\n- ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls (git-fixes).\n- ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio (stable-fixes).\n- ASoC: tlv320adcx140: Propagate error codes during probe (stable-fixes).\n- ASoC: wm8962: Add WM8962_ADC_MONOMIX to '3D Coefficients' mask (stable-fixes).\n- ASoC: wm8962: Don't report a microphone if it's shorted to ground on plug (stable-fixes).\n- ata: libata: avoid long timeouts on hot-unplugged SATA DAS (stable-fixes).\n- ata: pata_ftide010: Fix some DMA timings (git-fixes).\n- atm: fore200e: fix use-after-free in tasklets during device removal (git-fixes).\n- auxdisplay: arm-charlcd: fix release_mem_region() size (git-fixes).\n- backlight: qcom-wled: Change PM8950 WLED configurations (git-fixes).\n- backlight: qcom-wled: Support ovp values for PMI8994 (git-fixes).\n- batman-adv: Avoid double-rtnl_lock ELP metric worker (git-fixes).\n- block,bfq: fix aux stat accumulation destination (git-fixes).\n- Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler (git-fixes).\n- Bluetooth: btusb: Add device ID for Realtek RTL8761BU (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID for RTL8852CE (stable-fixes).\n- Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB (stable-fixes).\n- Bluetooth: hci_conn: Set link_policy on incoming ACL connections (stable-fixes).\n- Bluetooth: hci_conn: use mod_delayed_work for active mode timeout (stable-fixes).\n- Bluetooth: hci_qca: Cleanup on all setup failures (git-fixes).\n- Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix not checking output MTU is acceptable on L2CAP_ECRED_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short (git-fixes).\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- bpf: selftests: Move xfrm tunnel test to test_progs (bsc#1258860).\n- bpf: selftests: test_tunnel: Setup fresh topology for each subtest (bsc#1258860).\n- bpf: selftests: test_tunnel: Use vmlinux.h declarations (bsc#1258860).\n- bpf: verifier improvement in 32bit shift sign extension pattern (git-fixes).\n- bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc (bsc#1258860).\n- bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state() (bsc#1258860).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- bus: fsl-mc: fix an error handling in fsl_mc_device_add() (git-fixes).\n- bus: fsl-mc: fix use-after-free in driver_override_show() (git-fixes).\n- bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions (stable-fixes).\n- can: bcm: fix locking for bcm_op runtime updates (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message (git-fixes).\n- can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value (git-fixes).\n- can: mcp251x: fix deadlock in error path of mcp251x_open (git-fixes).\n- can: ucan: Fix infinite loop from zero-length messages (git-fixes).\n- can: usb: etas_es58x: correctly anchor the urb in the read bulk callback (git-fixes).\n- cgroup: Fix incorrect WARN_ON_ONCE() in css_release_work_fn() (bsc#1256564 bsc#1259130).\n- cgroup: Show # of subsystem CSSes in cgroup.stat (bsc#1256564 bsc#1259130).\n- char: tpm: cr50: Remove IRQF_ONESHOT (git-fixes).\n- char: tpm: cr50: Remove IRQF_ONESHOT (stable-fixes).\n- cifs: add xid to query server interface call (git-fixes).\n- clk: clk-apple-nco: Add 'apple,t8103-nco' compatible (git-fixes).\n- clk: mediatek: Fix error handling in runtime PM setup (git-fixes).\n- clk: meson: g12a: Limit the HDMI PLL OD to /4 (git-fixes).\n- clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs (git-fixes).\n- clk: mvebu: cp110 add CLK_IGNORE_UNUSED to pcie_x10, pcie_x11 & (git-fixes).\n- clk: qcom: dispcc-sdm845: Enable parents for pixel clocks (git-fixes).\n- clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).\n- clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).\n- clk: qcom: gfx3d: add parent to parent request map (git-fixes).\n- clk: qcom: rcg2: compute 2d using duty fraction directly (git-fixes).\n- clk: renesas: rzg2l: Fix intin variable size (git-fixes).\n- clk: renesas: rzg2l: Select correct div round macro (git-fixes).\n- clk: tegra: tegra124-emc: fix device leak on set_rate() (git-fixes).\n- clk: tegra: tegra124-emc: Fix potential memory leak in tegra124_clk_register_emc() (git-fixes).\n- clocksource: hyper-v: Fix warnings for missing export.h header inclusion (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- config.conf: add kernel-azure as additonal flavor (bsc#1258037).\n- config.conf: Drop armv7hl builds (bsc#1255265).\n- cpu: export lockdep_assert_cpus_held() (git-fixes).\n- cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update (bsc#1247180).\n- cpufreq/amd-pstate: Add the missing cpufreq_cpu_put() (bsc#1247180).\n- cpufreq/amd-pstate: fix setting policy current frequency value (bsc#1247180).\n- cpufreq/amd-pstate: Fix the clamping of perf values (bsc#1247180).\n- cpufreq/amd-pstate: Modularize perf<->freq conversion (bsc#1247180).\n- cpufreq/amd-pstate: Refactor max frequency calculation (bsc#1247180).\n- cpufreq/amd-pstate: store all values in cpudata struct in khz (bsc#1247180).\n- cpufreq: amd-pstate: Unify computation of {max,min,nominal,lowest_nonlinear}_freq (bsc#1247180).\n- crypto: cavium - fix dma_free_coherent() size (git-fixes).\n- crypto: ccp - Add an S4 restore flow (git-fixes).\n- crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue unavailable (git-fixes).\n- crypto: hisilicon/trng - support tfms sharing the device (git-fixes).\n- crypto: hisilicon/zip - adjust the way to obtain the req in the callback function (git-fixes).\n- crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode (git-fixes).\n- crypto: octeontx - fix dma_free_coherent() size (git-fixes).\n- crypto: octeontx - Fix length check to avoid truncation in ucode_load_store (git-fixes).\n- crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly (git-fixes).\n- crypto: qat - fix parameter order used in ICP_QAT_FW_COMN_FLAGS_BUILD (git-fixes).\n- crypto: qat - fix warning on adf_pfvf_pf_proto.c (git-fixes).\n- crypto: virtio - Add spinlock protection with virtqueue notification (git-fixes).\n- crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req (git-fixes).\n- device property: Allow secondary lookup in fwnode_get_next_child_node() (git-fixes).\n- dm mpath: make pg_init_delay_msecs settable (git-fixes).\n- dm-bufio: align write boundary on physical block size (git-fixes).\n- dm-ebs: Mark full buffer dirty even on partial write (git-fixes).\n- dm-snapshot: fix 'scheduling while atomic' on real-time kernels (git-fixes).\n- dm: clear cloned request bio pointer when last clone bio completes (git-fixes).\n- dm: remove fake timeout to avoid leak request (git-fixes).\n- dma: dma-axi-dmac: fix SW cyclic transfers (git-fixes).\n- dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX (git-fixes).\n- dmaengine: sun6i: Choose appropriate burst length under maxburst (stable-fixes).\n- Documentation: mailbox: mbox_chan_ops.flush() is optional (git-fixes).\n- Documentation: PCI: endpoint: Fix ntb/vntb copy & paste errors (git-fixes).\n- drivers/hv: add CPU offlining support (git-fixes).\n- drivers/hv: introduce vmbus_channel_set_cpu() (git-fixes).\n- Drivers: hv: Allocate interrupt and monitor pages aligned to system page boundary (git-fixes).\n- Drivers: hv: Always do Hyper-V panic notification in hv_kmsg_dump() (git-fixes).\n- Drivers: hv: Fix bad pointer dereference in hv_get_partition_id (git-fixes).\n- Drivers: hv: fix missing kernel-doc description for 'size' in request_arr_init() (git-fixes).\n- Drivers: hv: Fix the check for HYPERVISOR_CALLBACK_VECTOR (git-fixes).\n- Drivers: hv: Fix warnings for missing export.h header inclusion (git-fixes).\n- Drivers: hv: remove stale comment (git-fixes).\n- Drivers: hv: Resolve ambiguity in hypervisor version log (git-fixes).\n- Drivers: hv: use kmalloc_array() instead of kmalloc() (git-fixes).\n- Drivers: hv: Use kzalloc for panic page allocation (git-fixes).\n- Drivers: hv: util: Cosmetic changes for hv_utils_transport.c (git-fixes).\n- Drivers: hv: vmbus: Add comments about races with 'channels' sysfs dir (git-fixes).\n- Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store() (git-fixes).\n- Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-fixes).\n- Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).\n- Drivers: hv: vmbus: Get the IRQ number from DeviceTree (git-fixes).\n- Drivers: hv: vmbus: Introduce hv_get_vmbus_root_device() (git-fixes).\n- drivers: iio: mpu3050: use dev_err_probe for regulator request (git-fixes).\n- drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src (stable-fixes).\n- drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32 (stable-fixes).\n- drm/amd/display: avoid dig reg access timeout on usb4 link training fail (stable-fixes).\n- drm/amd/display: Avoid updating surface with the same surface under MPO (stable-fixes).\n- drm/amd/display: bypass post csc for additional color spaces in dal (stable-fixes).\n- drm/amd/display: Disable FEC when powering down encoders (stable-fixes).\n- drm/amd/display: extend delta clamping logic to CM3 LUT helper (stable-fixes).\n- drm/amd/display: Fix dsc eDP issue (stable-fixes).\n- drm/amd/display: Fix GFX12 family constant checks (stable-fixes).\n- drm/amd/display: Fix out-of-bounds stream encoder index v3 (git-fixes).\n- drm/amd/display: Fix system resume lag issue (stable-fixes).\n- drm/amd/display: Fix writeback on DCN 3.2+ (stable-fixes).\n- drm/amd/display: fix wrong color value mapping on MCM shaper LUT (git-fixes).\n- drm/amd/display: Increase DCN35 SR enter/exit latency (stable-fixes).\n- drm/amd/display: only power down dig on phy endpoints (stable-fixes).\n- drm/amd/display: Reject cursor plane on DCE when scaled differently than primary (git-fixes).\n- drm/amd/display: remove assert around dpp_base replacement (stable-fixes).\n- drm/amd/display: Remove conditional for shaper 3DLUT power-on (stable-fixes).\n- drm/amd/display: Use same max plane scaling limits for all 64 bpp formats (git-fixes).\n- drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (stable-fixes).\n- drm/amd: Disable MES LR compute W/A (git-fixes).\n- drm/amd: Drop 'amdgpu kernel modesetting enabled' message (git-fixes).\n- drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() (git-fixes).\n- drm/amdgpu/gfx10: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/gfx11: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/gfx12: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/soc21: fix xclk for APUs (stable-fixes).\n- drm/amdgpu: Add HAINAN clock adjustment (stable-fixes).\n- drm/amdgpu: add support for HDP IP version 6.1.1 (stable-fixes).\n- drm/amdgpu: Adjust usleep_range in fence wait (stable-fixes).\n- drm/amdgpu: avoid a warning in timedout job handler (stable-fixes).\n- drm/amdgpu: ensure no_hw_access is visible before MMIO (git-fixes).\n- drm/amdgpu: Fix locking bugs in error paths (git-fixes).\n- drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() (git-fixes).\n- drm/amdgpu: Fix memory leak in amdgpu_ras_init() (git-fixes).\n- drm/amdgpu: fix NULL pointer issue buffer funcs (stable-fixes).\n- drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify (git-fixes).\n- drm/amdgpu: keep vga memory on MacBooks with switchable graphics (stable-fixes).\n- drm/amdgpu: remove invalid usage of sched.ready (stable-fixes).\n- drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user (stable-fixes).\n- drm/amdgpu: Skip loading SDMA_RS64 in VF (stable-fixes).\n- drm/amdgpu: stop unmapping MQD for kernel queues v3 (stable-fixes).\n- drm/amdgpu: Unlock a mutex before destroying it (git-fixes).\n- drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges() (git-fixes).\n- drm/amdkfd: fix debug watchpoints for logical devices (stable-fixes).\n- drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map() (stable-fixes).\n- drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() (stable-fixes).\n- drm/amdkfd: Fix signal_eviction_fence() bool return value (git-fixes).\n- drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 (git-fixes).\n- drm/amdkfd: Handle GPU reset and drain retry fault race (stable-fixes).\n- drm/amdkfd: Relax size checking during queue buffer get (stable-fixes).\n- drm/atmel-hlcdc: don't reject the commit if the src rect has fractional parts (stable-fixes).\n- drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback (stable-fixes).\n- drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release (stable-fixes).\n- drm/bridge: anx7625: Fix invalid EDID size (git-fixes).\n- drm/bridge: samsung-dsim: Fix memory leak in error path (git-fixes).\n- drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used (git-fixes).\n- drm/buddy: Prevent BUG_ON by validating rounded allocation (git-fixes).\n- drm/display/dp_mst: Add protection against 0 vcpi (stable-fixes).\n- drm/i915/acpi: free _DSM package when no connectors (git-fixes).\n- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).\n- drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros (stable-fixes).\n- drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse() (git-fixes).\n- drm/mgag200: fix mgag200_bmc_stop_scanout() (git-fixes).\n- drm/msm/a2xx: fix pixel shader start on A225 (git-fixes).\n- drm/msm/disp: set num_planes to 1 for interleaved YUV formats (git-fixes).\n- drm/msm/dpu: drop intr_start from DPU 3.x catalog files (git-fixes).\n- drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x (git-fixes).\n- drm/msm/dpu: fix WD timer handling on DPU 8.x (git-fixes).\n- drm/msm/dpu: Set vsync source irrespective of mdp top support (git-fixes).\n- drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() (stable-fixes).\n- drm/panel: sw43408: Remove manual invocation of unprepare at remove (git-fixes).\n- drm/panthor: Evict groups before VM termination (git-fixes).\n- drm/panthor: Fix immediate ticking on a disabled tick (git-fixes).\n- drm/panthor: Fix the full_tick check (git-fixes).\n- drm/panthor: Fix the group priority rotation logic (git-fixes).\n- drm/panthor: Fix the logic that decides when to stop ticking (git-fixes).\n- drm/panthor: Make sure we resume the tick when new jobs are submitted (git-fixes).\n- drm/panthor: Recover from panthor_gpu_flush_caches() failures (git-fixes).\n- drm/radeon: Add HAINAN clock adjustment (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- drm/sched: Fix kernel-doc warning for drm_sched_job_done() (git-fixes).\n- drm/solomon: Fix page start when updating rectangle in page addressing mode (git-fixes).\n- drm/tegra: dsi: fix device leak on probe (git-fixes).\n- drm/tegra: hdmi: sor: Fix error: variable 'j' set but not used (stable-fixes).\n- drm/tests: shmem: Swap names of export tests (git-fixes).\n- drm/v3d: Set DMA segment size to avoid debug warnings (stable-fixes).\n- drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release (git-fixes).\n- drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (git-fixes).\n- drm/xe/mmio: Avoid double-adjust in 64-bit reads (git-fixes).\n- drm/xe/pm: Also avoid missing outer rpm warning on system suspend (stable-fixes).\n- drm/xe/pm: Disable D3Cold for BMG only on specific platforms (git-fixes).\n- drm/xe/ptl: Apply Wa_13011645652 (stable-fixes).\n- drm/xe/query: Fix topology query pointer advance (git-fixes).\n- drm/xe/sync: Cleanup partially initialized sync on parse failure (git-fixes).\n- drm/xe/xe2_hpg: Add set of workarounds (stable-fixes).\n- drm/xe/xe2_hpg: Fix handling of Wa_14019988906 & Wa_14019877138 (git-fixes).\n- drm/xe: Add xe_tile backpointer to xe_mmio (stable-fixes).\n- drm/xe: Adjust mmio code to pass VF substructure to SRIOV code (stable-fixes).\n- drm/xe: Clarify size of MMIO region (stable-fixes).\n- drm/xe: Create dedicated xe_mmio structure (stable-fixes).\n- drm/xe: Defer gt->mmio initialization until after multi-tile setup (git-fixes).\n- drm/xe: Move forcewake to 'gt.pm' substructure (stable-fixes).\n- drm/xe: Move GSI offset adjustment fields into 'struct xe_mmio' (stable-fixes).\n- drm/xe: Only toggle scheduling in TDR if GuC is running (stable-fixes).\n- drm/xe: Populate GT's mmio iomap from tile during init (stable-fixes).\n- drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt (stable-fixes).\n- drm/xe: Switch mmio_ext to use 'struct xe_mmio' (stable-fixes).\n- drm/xe: Unregister drm device on probe error (git-fixes).\n- drm: Account property blob allocations to memcg (stable-fixes).\n- efi: Fix reservation of unaccepted memory table (git-fixes).\n- efivarfs: fix error propagation in efivar_entry_get() (git-fixes).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- fbcon: check return value of con2fb_acquire_newinfo() (git-fixes).\n- fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() (git-fixes).\n- fbdev: ffb: fix corrupted video output on Sun FFB1 (stable-fixes).\n- fbdev: of: display_timing: fix refcount leak in of_get_display_timings() (git-fixes).\n- fbdev: rivafb: fix divide error in nv3_arb() (git-fixes).\n- fbdev: smscufx: properly copy ioctl memory to kernelspace (stable-fixes).\n- fbdev: vt8500lcdfb: fix missing dma_free_coherent() (git-fixes).\n- fpga: dfl: use subsys_initcall to allow built-in drivers to be added (git-fixes).\n- fpga: of-fpga-region: Fail if any bridge is missing (stable-fixes).\n- genirq: Set IRQF_COND_ONESHOT in devm_request_irq() (git-fixes).\n- gpio: aspeed-sgpio: Change the macro to support deferred probe (stable-fixes).\n- gpio: pca953x: mask interrupts in irq shutdown (stable-fixes).\n- gpio: sprd: Change sprd_gpio lock to raw_spin_lock (stable-fixes).\n- gpu/panel-edp: add AUO panel entry for B140HAN06.4 (stable-fixes).\n- HID: apple: Add 'SONiX KN85 Keyboard' to the list of non-apple keyboards (stable-fixes).\n- HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) (stable-fixes).\n- HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK (stable-fixes).\n- HID: hid-pl: handle probe errors (git-fixes).\n- HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() (stable-fixes).\n- HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients (git-fixes).\n- HID: intel-ish-hid: Reset enum_devices_done before enumeration (stable-fixes).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() (stable-fixes).\n- HID: magicmouse: Do not crash on missing msc->input (stable-fixes).\n- HID: multitouch: add eGalaxTouch EXC3188 support (stable-fixes).\n- HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL (stable-fixes).\n- HID: playstation: Add missing check for input_ff_create_memless (git-fixes).\n- HID: playstation: Center initial joystick axes to prevent spurious events (stable-fixes).\n- HID: prodikeys: Check presence of pm->input_ep82 (stable-fixes).\n- HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list (stable-fixes).\n- hwmon: (f71882fg) Add F81968 support (stable-fixes).\n- hwmon: (it87) Check the it87_lock() return value (git-fixes).\n- hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced race (git-fixes).\n- hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE (stable-fixes).\n- hwmon: (occ) Mark occ_init_attribute() as __printf (git-fixes).\n- hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read (git-fixes).\n- hyperv: Convert hypercall statuses to linux error codes (git-fixes).\n- hyperv: Move arch/x86/hyperv/hv_proc.c to drivers/hv (git-fixes).\n- hyperv: Move hv_current_partition_id to arch-generic code (git-fixes).\n- i3c: dw: Initialize spinlock to avoid upsetting lockdep (git-fixes).\n- i3c: master: svc: Initialize 'dev' to NULL in svc_i3c_master_ibi_isr() (stable-fixes).\n- i3c: master: Update hot-join flag only on success (git-fixes).\n- i3c: Move device name assignment after i3c_bus_init (git-fixes).\n- iio: gyro: itg3200: Fix unchecked return value in read_raw (git-fixes).\n- iio: magnetometer: Remove IRQF_ONESHOT (stable-fixes).\n- iio: sca3000: Fix a resource leak in sca3000_probe() (git-fixes).\n- iio: Use IRQF_NO_THREAD (stable-fixes).\n- Input: stmfts - correct wording for the warning message (git-fixes).\n- Input: stmfts - make comments correct (git-fixes).\n- iomap: account for unaligned end offsets when truncating read range (git-fixes).\n- ipmi: ipmb: initialise event handler read bytes (git-fixes).\n- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).\n- KVM: nSVM: Clear exit_code_hi in VMCB when synthesizing nested VM-Exits (git-fixes).\n- KVM: nSVM: Set exit_code_hi to -1 when synthesizing SVM_EXIT_ERR (failed VMRUN) (git-fixes).\n- KVM: x86: Don't clear async #PF queue when CR0.PG is disabled (e.g. on #SMI) (git-fixes).\n- KVM: x86: Explicitly set new periodic hrtimer expiration in apic_timer_fn() (git-fixes).\n- KVM: x86: WARN if hrtimer callback for periodic APIC timer fires with period=0 (git-fixes).\n- landlock: Optimize file path walks and prepare for audit support (bsc#1255698).\n- leds: qcom-lpg: Check the return value of regmap_bulk_write() (git-fixes).\n- media: adv7180: fix frame interval in progressive mode (stable-fixes).\n- media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START (stable-fixes).\n- media: amphion: Drop min_queued_buffers assignment (git-fixes).\n- media: ccs: Accommodate C-PHY into the calculation (git-fixes).\n- media: ccs: Avoid possible division by zero (git-fixes).\n- media: ccs: Fix setting initial sub-device state (git-fixes).\n- media: chips-media: wave5: Fix memory leak on codec_info allocation failure (git-fixes).\n- media: cx88: Add missing unmap in snd_cx88_hw_params() (git-fixes).\n- media: cx23885: Add missing unmap in snd_cx23885_hw_params() (git-fixes).\n- media: cx25821: Add missing unmap in snd_cx25821_hw_params() (git-fixes).\n- media: cx25821: Fix a resource leak in cx25821_dev_setup() (stable-fixes).\n- media: dvb-core: dmxdevfilter must always flush bufs (stable-fixes).\n- media: dvb-core: fix wrong reinitialization of ringbuffer on reopen (git-fixes).\n- media: dvb-net: fix OOB access in ULE extension header tables (git-fixes).\n- media: i2c/tw9903: Fix potential memory leak in tw9903_probe() (git-fixes).\n- media: i2c/tw9906: Fix potential memory leak in tw9906_probe() (git-fixes).\n- media: i2c: ov5647: Correct minimum VBLANK value (git-fixes).\n- media: i2c: ov5647: Correct pixel array offset (git-fixes).\n- media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode (git-fixes).\n- media: i2c: ov5647: Initialize subdev before controls (git-fixes).\n- media: i2c: ov5647: Sensor should report RAW color space (git-fixes).\n- media: i2c: ov5647: use our own mutex for the ctrl lock (git-fixes).\n- media: ipu6: Fix RPM reference leak in probe error paths (git-fixes).\n- media: ipu6: Fix typo and wrong constant in ipu6-mmu.c (git-fixes).\n- media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() (git-fixes).\n- media: mtk-mdp: Fix error handling in probe function (git-fixes).\n- media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes (stable-fixes).\n- media: omap3isp: isppreview: always clamp in preview_try_format() (stable-fixes).\n- media: omap3isp: set initial format (stable-fixes).\n- media: pvrusb2: fix URB leak in pvr2_send_request_ex (stable-fixes).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- media: radio-keene: fix memory leak in error path (git-fixes).\n- media: rkisp1: Fix filter mode register configuration (stable-fixes).\n- media: solo6x10: Check for out of bounds chip_id (stable-fixes).\n- media: tegra-video: Fix memory leak in __tegra_channel_try_format() (git-fixes).\n- media: uvcvideo: Fix allocation for small frame sizes (git-fixes).\n- media: v4l2-async: Fix error handling on steps after finding a match (stable-fixes).\n- media: venus: vdec: fix error state assignment for zero bytesused (git-fixes).\n- media: verisilicon: AV1: Fix enable cdef computation (git-fixes).\n- media: verisilicon: AV1: Fix tile info buffer size (git-fixes).\n- media: verisilicon: AV1: Fix tx mode bit setting (git-fixes).\n- media: verisilicon: AV1: Set IDR flag for intra_only frame type (git-fixes).\n- mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer() failure (git-fixes).\n- mfd: core: Add locking around 'mfd_of_node_list' (git-fixes).\n- mfd: tps6105x: Fix kernel-doc warnings relating to the core struct and tps6105x_mode (git-fixes).\n- mfd: wm8350-core: Use IRQF_ONESHOT (git-fixes).\n- misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() (stable-fixes).\n- misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 (stable-fixes).\n- mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() (git-fixes).\n- mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms (git-fixes).\n- mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() (git-fixes).\n- mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions() (git-fixes).\n- mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper (git-fixes).\n- mtd: rawnand: pl353: Fix software ECC support (git-fixes).\n- mtd: spinand: Fix kernel doc (git-fixes).\n- myri10ge: avoid uninitialized variable use (stable-fixes).\n- net: mana: Fix double destroy_workqueue on service rescan PCI path (git-fixes).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).\n- net: mana: Support HW link state events (bsc#1253049).\n- net: nfc: nci: Fix parameter validation for packet data (git-fixes).\n- net: nfc: nci: Fix zero-length proprietary notifications (git-fixes).\n- net: usb: catc: enable basic endpoint checking (git-fixes).\n- net: usb: kalmia: validate USB endpoints (git-fixes).\n- net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode (git-fixes).\n- net: usb: kaweth: validate USB endpoints (git-fixes).\n- net: usb: lan78xx: fix silent drop of packets with checksum errors (git-fixes).\n- net: usb: lan78xx: fix TX byte statistics for small packets (git-fixes).\n- net: usb: lan78xx: scan all MDIO addresses on LAN7801 (git-fixes).\n- net: usb: pegasus: enable basic endpoint checking (git-fixes).\n- net: usb: r8152: fix transmit queue timeout (stable-fixes).\n- net: usb: sr9700: remove code to drive nonexistent multicast filter (stable-fixes).\n- net: usb: sr9700: support devices with virtual driver CD (stable-fixes).\n- net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() (git-fixes).\n- net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets (git-fixes).\n- nfc: hci: shdlc: Stop timers and work before freeing context (git-fixes).\n- nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback (git-fixes).\n- nfc: nci: free skb on nci_transceive early error paths (git-fixes).\n- nfc: nxp-nci: remove interrupt trigger type (stable-fixes).\n- nfc: pn533: properly drop the usb interface reference on disconnect (git-fixes).\n- nfc: rawsock: cancel tx_work before socket teardown (git-fixes).\n- nfsd: check that server is running in unlock_filesystem (bsc#1257279).\n- nfsd: use correct loop termination in nfsd4_revoke_states() (git-fixes).\n- nouveau/dpcd: return EBUSY for aux xfer if the device is asleep (git-fixes).\n- ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access (stable-fixes).\n- ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut (stable-fixes).\n- NTB: ntb_transport: Fix too small buffer for debugfs_name (git-fixes).\n- nvme-fc: don't hold rport lock when putting ctrl (git-fixes).\n- nvme-fc: release admin tagset if init fails (git-fixes).\n- nvme-pci: disable secondary temp for Wodposit WPBSNM8 (git-fixes).\n- PCI/ACPI: Restrict program_hpx_type2() to AER bits (git-fixes).\n- PCI/IOV: Fix race between SR-IOV enable/disable and hotplug (git-fixes).\n- PCI/MSI: Unmap MSI-X region on error (git-fixes).\n- PCI/MSI: Unmap MSI-X region on error (stable-fixes).\n- PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails (git-fixes).\n- PCI/PM: Avoid redundant delays on D3hot->D3cold (git-fixes).\n- PCI/portdrv: Fix potential resource leak (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] (git-fixes).\n- PCI: Add ACS quirk for Qualcomm Hamoa & Glymur (git-fixes).\n- PCI: Add ACS quirk for Qualcomm Hamoa & Glymur (stable-fixes).\n- PCI: Add defines for bridge window indexing (stable-fixes).\n- PCI: Add PCIE_MSG_CODE_ASSERT_INTx message macros (stable-fixes).\n- PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value (git-fixes).\n- PCI: Do not attempt to set ExtTag for VFs (git-fixes).\n- PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (git-fixes).\n- PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (stable-fixes).\n- PCI: Enable ACS after configuring IOMMU for OF platforms (git-fixes).\n- PCI: Enable ACS after configuring IOMMU for OF platforms (stable-fixes).\n- PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions (git-fixes).\n- PCI: Fix pci_slot_lock () device locking (git-fixes).\n- PCI: Fix pci_slot_lock () device locking (stable-fixes).\n- PCI: Fix pci_slot_trylock() error handling (git-fixes).\n- PCI: hv: Correct a comment (git-fixes).\n- PCI: hv: Fix warnings for missing export.h header inclusion (git-fixes).\n- PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).\n- PCI: hv: remove unnecessary module_init/exit functions (git-fixes).\n- PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).\n- PCI: Initialize RCB from pci_configure_device() (git-fixes).\n- PCI: Log bridge info when first enumerating bridge (stable-fixes).\n- PCI: Log bridge windows conditionally (stable-fixes).\n- PCI: Mark 3ware-9650SA Root Port Extended Tags as broken (git-fixes).\n- PCI: Mark ASM1164 SATA controller to avoid bus reset (git-fixes).\n- PCI: Mark ASM1164 SATA controller to avoid bus reset (stable-fixes).\n- PCI: Mark Nvidia GB10 to avoid bus reset (git-fixes).\n- PCI: Mark Nvidia GB10 to avoid bus reset (stable-fixes).\n- PCI: mediatek: Fix IRQ domain leak when MSI allocation fails (git-fixes).\n- PCI: Move pci_read_bridge_windows() below individual window accessors (stable-fixes).\n- PCI: Supply bridge device, not secondary bus, to read window details (stable-fixes).\n- phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature (stable-fixes).\n- phy: mvebu-cp110-utmi: fix dr_mode property read from dts (stable-fixes).\n- pinctrl: equilibrium: Fix device node reference leak in pinbank_init() (git-fixes).\n- pinctrl: meson: mark the GPIO controller as sleeping (git-fixes).\n- pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition (git-fixes).\n- pinctrl: single: fix refcount leak in pcs_add_gpio_func() (git-fixes).\n- platform/chrome: cros_ec_lightbar: Fix response size initialization (git-fixes).\n- platform/chrome: cros_typec_switch: Don't touch struct fwnode_handle::dev (git-fixes).\n- platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro (stable-fixes).\n- platform/x86: classmate-laptop: Add missing NULL pointer checks (stable-fixes).\n- platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data (git-fixes).\n- platform/x86: hp-bioscfg: Skip empty attribute names (git-fixes).\n- platform/x86: int0002: Remove IRQF_ONESHOT from request_irq() (git-fixes).\n- platform/x86: intel_telemetry: Fix PSS event register mask (git-fixes).\n- platform/x86: intel_telemetry: Fix swapped arrays in PSS output (git-fixes).\n- platform/x86: ISST: Add missing write block check (git-fixes).\n- platform/x86: panasonic-laptop: Fix sysfs group leak in error path (stable-fixes).\n- platform/x86: toshiba_haps: Fix memory leaks in add/remove routines (git-fixes).\n- PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races (git-fixes).\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- PM: wakeup: Handle empty list in wakeup_sources_walk_start() (git-fixes).\n- pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset (git-fixes).\n- power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write (git-fixes).\n- power: supply: ab8500: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: act8945a: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq27xxx: fix wrong errno when bus ops are unsupported (git-fixes).\n- power: supply: bq256xx: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq25980: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: cpcap-battery: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: goldfish: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: qcom_battmgr: Recognize 'LiP' as lithium-polymer (git-fixes).\n- power: supply: rt9455: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: sbs-battery: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: wm97xx: Fix NULL pointer dereference in power_supply_changed() (git-fixes).\n- powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check (git-fixes).\n- qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size (git-fixes).\n- rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() (git-fixes).\n- RDMA/mana_ib: Add device-memory support (git-fixes).\n- RDMA/mana_ib: Take CQ type from the device type (git-fixes).\n- RDMA/rtrs-clt: For conn rejection use actual err number (git-fixes).\n- regmap: maple: free entry on mas_store_gfp() failure (stable-fixes).\n- regulator: core: fix locking in regulator_resolve_supply() error path (git-fixes).\n- regulator: core: move supply check earlier in set_machine_constraints() (git-fixes).\n- remoteproc: sysmon: Correct subsys_name_len type in QMI request (git-fixes).\n- Revert 'bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc (bsc#1258860).\n- Revert 'drm/amd: Check if ASPM is enabled from PCIe subsystem' (git-fixes).\n- Revert 'drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit)' (git-fixes).\n- Revert 'hwmon: (ibmpex) fix use-after-free in high/low store' (git-fixes).\n- Revert 'mfd: da9052-spi: Change read-mask to write-mask' (stable-fixes).\n- Revert 'mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms' (git-fixes).\n- Revert 'PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV' (git-fixes).\n- Revert 'selftests/bpf: Add tc helpers (bsc#1258860).\n- Revert 'selftests/bpf: Remove '&>' usage in the selftests (bsc#1258860).\n- Revert 'selftests/bpf: Remove test_tc_tunnel.sh (bsc#1258860).\n- Revert 'selftests/bpf: Support when CONFIG_VXLAN=m (bsc#1258860).\n- Revert 'selftests/bpf: test_tunnel: Add ping helpers (bsc#1258860).\n- Revert 'selftests/bpf: test_tunnel: Remove test_tunnel.sh (bsc#1258860).\n- Revert 'selftests/bpf: Use make_sockaddr in test_sock_addr (bsc#1258860).\n- rpmsg: core: fix race in driver_override_show() and use core helper (git-fixes).\n- rtc: interface: Alarm race handling should not discard preceding error (git-fixes).\n- rtc: zynqmp: correct frequency value (stable-fixes).\n- s390/cio: Update purge function to unregister the unused subchannels (bsc#1254214).\n- s390/ipl: Clear SBP flag when bootprog is set (bsc#1258176).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253644).\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: mpi3mr: Event processing debug improvement (bsc#1251186 bsc#1258832).\n- scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).\n- scsi: storvsc: Remove redundant ternary operators (git-fixes).\n- selftests/bpf: Add tc helpers (bsc#1258860).\n- selftests/bpf: add verifier sign extension bound computation tests (git-fixes).\n- selftests/bpf: Integrate test_tc_tunnel.sh tests into test_progs (bsc#1258860).\n- selftests/bpf: Make test_tc_tunnel.bpf.c compatible with big endian platforms (bsc#1258860).\n- selftests/bpf: Remove '&>' usage in the selftests (bsc#1258860).\n- selftests/bpf: Remove test_tc_tunnel.sh (bsc#1258860).\n- selftests/bpf: Support when CONFIG_VXLAN=m (bsc#1258860).\n- selftests/bpf: test_tunnel: Add generic_attach* helpers (bsc#1258860).\n- selftests/bpf: test_tunnel: Add ping helpers (bsc#1258860).\n- selftests/bpf: test_tunnel: Move erspan tunnel tests to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move geneve tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move gre tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6erspan tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6geneve tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6gre tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6tnl tunnel tests to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Remove test_tunnel.sh (bsc#1258860).\n- selftests/bpf: Use connect_to_addr in test_sock_addr (bsc#1258860).\n- selftests/bpf: Use log_err in open_netns/close_netns (bsc#1258860).\n- selftests/bpf: Use make_sockaddr in test_sock_addr (bsc#1258860).\n- selftests/bpf: Use start_server_addr in test_sock_addr (bsc#1258860).\n- serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done (git-fixes).\n- serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done (stable-fixes).\n- serial: 8250_dw: handle clock enable errors in runtime_resume (git-fixes).\n- serial: 8250_dw: handle clock enable errors in runtime_resume (stable-fixes).\n- serial: imx: change SERIAL_IMX_CONSOLE to bool (git-fixes).\n- serial: SH_SCI: improve 'DMA support' prompt (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() (git-fixes).\n- soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in cmd_db_dev_probe (git-fixes).\n- soc: qcom: smem: handle ENOMEM error during probe (git-fixes).\n- soc: ti: k3-socinfo: Fix regmap leak on probe failure (git-fixes).\n- soc: ti: pruss: Fix double free in pruss_clk_mux_setup() (git-fixes).\n- soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15) (stable-fixes).\n- soundwire: intel_ace2x: add SND_HDA_CORE dependency (git-fixes).\n- spi-geni-qcom: initialize mode related registers to 0 (stable-fixes).\n- spi-geni-qcom: use xfer->bits_per_word for can_dma() (stable-fixes).\n- spi: spi-mem: Limit octal DTR constraints to octal DTR situations (git-fixes).\n- spi: spi-mem: Limit octal DTR constraints to octal DTR situations (stable-fixes).\n- spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (git-fixes).\n- spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (stable-fixes).\n- spi: spidev: fix lock inversion between spi_lock and buf_lock (git-fixes).\n- spi: stm32: fix Overrun issue at < 8bpw (stable-fixes).\n- spi: tegra114: Preserve SPI mode bits in def_command1_reg (git-fixes).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (git-fixes).\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952).\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer (git-fixes).\n- spi: tegra: Fix a memory leak in tegra_slink_probe() (git-fixes).\n- spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe() (git-fixes).\n- spi: wpcm-fiu: Fix uninitialized res (git-fixes).\n- spi: wpcm-fiu: Simplify with dev_err_probe() (stable-fixes).\n- spi: wpcm-fiu: Use devm_platform_ioremap_resource_byname() (stable-fixes).\n- staging: rtl8723bs: fix memory leak on failure path (stable-fixes).\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- staging: rtl8723bs: fix null dereference in find_network (git-fixes).\n- thermal: int340x: Fix sysfs group leak on DLVR registration failure (stable-fixes).\n- thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature (git-fixes).\n- tools/hv: fcopy: Fix irregularities with size of ring buffer (git-fixes).\n- tools/power cpupower: Reset errno before strtoull() (stable-fixes).\n- tools/power/x86/intel-speed-select: Fix file descriptor leak in isolate_cpus() (git-fixes).\n- tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).\n- tpm: st33zp24: Fix missing cleanup on get_burstcount() error (git-fixes).\n- tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure (git-fixes).\n- uio_hv_generic: Align ring size to system page (git-fixes).\n- uio_hv_generic: Use correct size for interrupt and monitor pages (git-fixes).\n- Update 'drm/mgag200: fix mgag200_bmc_stop_scanout()' bug number (bsc#1258153 bsc#1258226).\n- Update 'drm/mgag200: fix mgag200_bmc_stop_scanout()' bug number (bsc#1258153).\n- usb: bdc: fix sleep during atomic (git-fixes).\n- usb: dwc2: fix resume failure if dr_mode is host (git-fixes).\n- usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN (git-fixes).\n- USB: serial: option: add Telit FN920C04 RNDIS compositions (stable-fixes).\n- usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs (git-fixes).\n- watchdog: imx7ulp_wdt: handle the nowayout option (stable-fixes).\n- wifi: ath9k: debug.h: fix kernel-doc bad lines and struct ath_tx_stats (git-fixes).\n- wifi: ath9k: fix kernel-doc warnings in common-debug.h (git-fixes).\n- wifi: ath10k: fix lock protection in ath10k_wmi_event_peer_sta_ps_state_chg() (stable-fixes).\n- wifi: ath10k: sdio: add missing lock protection in ath10k_sdio_fw_crashed_dump() (git-fixes).\n- wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 (stable-fixes).\n- wifi: ath11k: Fix failure to connect to a 6 GHz AP (stable-fixes).\n- wifi: ath12k: fix preferred hardware mode calculation (stable-fixes).\n- wifi: cfg80211: allow only one NAN interface, also in multi radio (stable-fixes).\n- wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() (git-fixes).\n- wifi: cfg80211: Fix bitrate calculation overflow for HE rates (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n- wifi: cfg80211: stop NAN and P2P in cfg80211_leave (git-fixes).\n- wifi: cfg80211: wext: fix IGTK key ID off-by-one (git-fixes).\n- wifi: cw1200: Fix locking in error paths (git-fixes).\n- wifi: iwlegacy: add missing mutex protection in il3945_store_measurement() (stable-fixes).\n- wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power() (stable-fixes).\n- wifi: iwlwifi: mvm: check the validity of noa_len (stable-fixes).\n- wifi: iwlwifi: mvm: pause TCM on fast resume (git-fixes).\n- wifi: libertas: fix WARNING in usb_tx_block (stable-fixes).\n- wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration (git-fixes).\n- wifi: mac80211: collect station statistics earlier when disconnect (stable-fixes).\n- wifi: mac80211: correctly check if CSA is active (stable-fixes).\n- wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice (stable-fixes).\n- wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() (git-fixes).\n- wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (stable-fixes).\n- wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() (git-fixes).\n- wifi: radiotap: reject radiotap with unknown bits (git-fixes).\n- wifi: rsi: Don't default to -EOPNOTSUPP in rsi_mac80211_config (git-fixes).\n- wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add (git-fixes).\n- wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() (stable-fixes).\n- wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() (git-fixes).\n- wifi: rtw88: fix DTIM period handling when conf->dtim_period is zero (stable-fixes).\n- wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H (stable-fixes).\n- wifi: rtw89: 8922a: set random mac if efuse contains zeroes (stable-fixes).\n- wifi: rtw89: mac: correct page number for CSI response (stable-fixes).\n- wifi: rtw89: pci: restore LDO setting after device resume (stable-fixes).\n- wifi: rtw89: ser: enable error IMR after recovering from L1 (stable-fixes).\n- wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode (stable-fixes).\n- wifi: wlcore: ensure skb headroom before skb_push (stable-fixes).\n- wifi: wlcore: Fix a locking bug (git-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891).\n- x86/hyperv: fix an indentation issue in mshyperv.h (git-fixes).\n- x86/hyperv: Fix usage of cpu_online_mask to get valid cpu (git-fixes).\n- x86/hyperv: Fix warnings for missing export.h header inclusion (git-fixes).\n- x86/hyperv: Use named operands in inline asm (git-fixes).\n",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/SUSE%2FSUSE-SU-2026:1081-1.json?alt=media"
                },
                {
                    "category": "other",
                    "text": "0.00013",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "3.8",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "Is related to (a version of) an uncommon product, Is related to (a version of) product Linux Kernel, Is related to a product by vendor Open Source, Is related to a product by vendor Linux, The value of the most recent EPSS score",
                    "title": "NCSC Score top decreasing factors"
                },
                {
                    "category": "details",
                    "text": "Severity: 2\n",
                    "title": "Vendor assessment"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1330297",
                    "CSAFPID-1439319",
                    "CSAFPID-1453381",
                    "CSAFPID-1453382",
                    "CSAFPID-2858634",
                    "CSAFPID-2858635",
                    "CSAFPID-1286675",
                    "CSAFPID-5669119",
                    "CSAFPID-5669120",
                    "CSAFPID-5669121",
                    "CSAFPID-5669122",
                    "CSAFPID-5674307",
                    "CSAFPID-1295663",
                    "CSAFPID-5754847",
                    "CSAFPID-5839350",
                    "CSAFPID-5844406",
                    "CSAFPID-1317174",
                    "CSAFPID-1330296",
                    "CSAFPID-1317177",
                    "CSAFPID-5910478",
                    "CSAFPID-5910479",
                    "CSAFPID-5910480",
                    "CSAFPID-5910481",
                    "CSAFPID-5943973",
                    "CSAFPID-5943974",
                    "CSAFPID-5943975",
                    "CSAFPID-5943976",
                    "CSAFPID-5943977",
                    "CSAFPID-5943978",
                    "CSAFPID-5943979",
                    "CSAFPID-5943980",
                    "CSAFPID-5943981",
                    "CSAFPID-5943982",
                    "CSAFPID-5943983",
                    "CSAFPID-5943984",
                    "CSAFPID-5943985",
                    "CSAFPID-5943986",
                    "CSAFPID-5943987"
                ],
                "known_not_affected": [
                    "CSAFPID-5618223",
                    "CSAFPID-5629416",
                    "CSAFPID-5629417",
                    "CSAFPID-1439315",
                    "CSAFPID-1439317",
                    "CSAFPID-1439321",
                    "CSAFPID-1453376",
                    "CSAFPID-1453377",
                    "CSAFPID-1453378",
                    "CSAFPID-1453379",
                    "CSAFPID-1453380",
                    "CSAFPID-1286676",
                    "CSAFPID-5669083",
                    "CSAFPID-2036022",
                    "CSAFPID-2036023"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Source raw - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/71xxx/CVE-2025-71234.json"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Source raw - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Source - debian",
                    "url": "https://security-tracker.debian.org/tracker/CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/GIT%2FCVE-2025-71234.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - certbundde",
                    "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0462.json"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Source raw - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Source raw - redhat",
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-71234.json"
                },
                {
                    "category": "external",
                    "summary": "Source - microsoft",
                    "url": "https://api.msrc.microsoft.com/cvrf/v3.0/cvrf/2026-Feb"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=10000"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/SUSE%2FSUSE-SU-2026:20667-1.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/SUSE%2FSUSE-SU-2026:1081-1.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv",
                    "url": "https://git.kernel.org/stable/c/5d810ba377eddee95d30766d360a14efbb3d1872"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv",
                    "url": "https://git.kernel.org/stable/c/116f7bd8160c6b37d1c6939385abf90f6f6ed2f5"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv",
                    "url": "https://git.kernel.org/stable/c/9a0f3fa6ecd0c9c32dbc367a57482bbf7c7d25bf"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71234.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv; redhat",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0462.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0462"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021859-CVE-2025-71225-44de@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021859-CVE-2025-71226-5662@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021859-CVE-2025-71227-949c@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021859-CVE-2025-71228-d43d@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021802-CVE-2025-71229-81bd@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021804-CVE-2025-71230-8e25@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021805-CVE-2025-71231-5cc3@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021805-CVE-2025-71232-8ee0@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021805-CVE-2025-71233-0c35@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021805-CVE-2025-71234-3bb7@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021805-CVE-2025-71235-b233@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021806-CVE-2025-71236-26df@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021806-CVE-2025-71237-545a@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021830-CVE-2026-23211-10d0@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021832-CVE-2026-23212-adae@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23213-c699@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23214-c822@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23215-3294@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23216-6c63@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23217-f399@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021801-CVE-2026-23218-4114@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021801-CVE-2026-23219-3569@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021806-CVE-2026-23220-efda@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021806-CVE-2026-23221-43ae@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021806-CVE-2026-23222-3958@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021806-CVE-2026-23223-e3d3@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021807-CVE-2026-23224-b534@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021807-CVE-2026-23225-2a27@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021807-CVE-2026-23226-438c@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021807-CVE-2026-23227-6986@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021807-CVE-2026-23228-647c@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021808-CVE-2026-23229-9dfe@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021808-CVE-2026-23230-8d0e@gregkh/"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://lore.kernel.org/linux-cve-announce/2026021805-CVE-2025-71234-3bb7@gregkh/T"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv",
                    "url": "https://git.kernel.org/stable/c/86c946bcc00f6390ef65e9614ae60a9377e454f8"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.debian.org/debian-security-announce/2026/msg00072.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00002.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-099.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-114.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://linux.oracle.com/errata/ELSA-2026-50160.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620667-1/"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1241345"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1243055"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1249587"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1251966"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1252911"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1252924"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1253691"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1254992"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255129"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255265"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255379"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255530"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255698"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256564"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256640"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256679"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256683"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256708"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256716"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256755"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256802"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256863"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257159"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257179"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257209"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257228"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257231"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257246"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257552"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257554"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257557"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257559"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257560"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257562"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257570"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257573"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257576"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257579"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257580"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257586"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257635"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257679"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257687"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257704"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257706"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257707"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257714"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257715"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257716"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257718"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257722"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257723"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257729"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257735"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257739"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257740"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257741"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257743"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257745"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257749"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257750"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257757"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257758"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257759"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257761"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257762"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257763"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257765"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257768"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257770"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257772"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257775"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257776"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257788"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257789"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257790"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257805"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257808"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257809"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257811"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257813"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257816"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257830"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257891"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257942"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257952"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258153"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258181"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258184"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258222"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258234"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258237"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258245"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258249"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258252"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258256"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258259"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258272"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258273"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258277"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258278"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258279"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258299"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258304"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258309"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258313"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258317"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258321"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258326"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258338"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258349"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258354"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258358"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258374"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258377"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258379"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258394"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258395"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258397"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258411"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258415"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258419"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258422"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258424"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258429"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258442"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258464"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258465"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258468"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258469"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258484"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258518"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258519"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258520"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258524"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258544"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258660"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258824"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258928"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259070"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2023-53817"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-37861"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-39748"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-39964"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-40099"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-40103"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68283"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68295"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68374"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68736"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68778"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68785"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68810"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71071"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71104"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71113"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71126"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71148"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71182"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71184"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71185"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71188"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71189"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71190"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71191"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71192"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71194"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71195"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71196"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71197"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71198"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71199"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71200"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71222"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71224"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71225"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71229"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71231"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71232"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71234"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71235"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71236"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-22979"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-22982"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-22998"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23003"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23004"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23017"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23021"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23026"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23033"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23035"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23037"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23049"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23053"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23056"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23057"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23058"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23060"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23061"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23063"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23064"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23068"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23071"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23073"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23074"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23076"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23078"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23080"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23082"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23083"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23084"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23085"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23086"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23089"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23090"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23091"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23094"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23095"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23096"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23099"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23101"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23102"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23104"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23105"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23107"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23108"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23110"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23111"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23112"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23113"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23116"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23119"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23121"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23129"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23133"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23135"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23139"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23141"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23145"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23146"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23150"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23151"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23152"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23155"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23156"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23163"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23166"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23167"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23170"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23171"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23172"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23173"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23176"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23178"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23179"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23182"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23190"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23191"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23198"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23202"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23207"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23208"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23209"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23213"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23214"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23221"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23222"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23229"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261081-1/"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1245728"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1247180"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1249998"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1251135"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1251186"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1251971"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1252008"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1252266"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1253049"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1253129"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1253455"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1253644"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1254214"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1254306"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255084"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255811"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256645"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1256784"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257279"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257332"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257466"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257472"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257473"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257553"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257556"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257709"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257732"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257734"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257742"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257755"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1257814"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258517"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258832"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258849"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258850"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258860"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259130"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259558"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259580"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259857"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-39817"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-40201"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-40253"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-68735"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71066"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2025-71125"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23088"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23125"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23128"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23131"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-22989"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23010"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23023"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23038"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23054"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23062"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23065"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23069"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23070"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23154"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23157"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23169"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23204"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23210"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23268"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-23269"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025086.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258037"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258176"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258226"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258286"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258293"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258297"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258298"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258340"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258376"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1258389"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1286675",
                        "CSAFPID-1295663",
                        "CSAFPID-1317174",
                        "CSAFPID-1317177",
                        "CSAFPID-1330296",
                        "CSAFPID-1330297",
                        "CSAFPID-1439319",
                        "CSAFPID-1453381",
                        "CSAFPID-1453382",
                        "CSAFPID-2858634",
                        "CSAFPID-2858635",
                        "CSAFPID-5669119",
                        "CSAFPID-5669120",
                        "CSAFPID-5669121",
                        "CSAFPID-5669122",
                        "CSAFPID-5674307",
                        "CSAFPID-5754847",
                        "CSAFPID-5839350",
                        "CSAFPID-5844406",
                        "CSAFPID-5910478",
                        "CSAFPID-5910479",
                        "CSAFPID-5910480",
                        "CSAFPID-5910481",
                        "CSAFPID-5943973",
                        "CSAFPID-5943974",
                        "CSAFPID-5943975",
                        "CSAFPID-5943976",
                        "CSAFPID-5943977",
                        "CSAFPID-5943978",
                        "CSAFPID-5943979",
                        "CSAFPID-5943980",
                        "CSAFPID-5943981",
                        "CSAFPID-5943982",
                        "CSAFPID-5943983",
                        "CSAFPID-5943984",
                        "CSAFPID-5943985",
                        "CSAFPID-5943986",
                        "CSAFPID-5943987"
                    ]
                }
            ],
            "title": "CVE-2025-71234"
        }
    ]
}