{"id":"SUSE-SU-2026:21352-1","summary":"Security update for the Linux Kernel","details":"\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned positions (bsc#1256647).\n- CVE-2025-71239: audit: add fchmodat2() to change attributes class (bsc#1259759).\n- CVE-2026-23072: l2tp: Fix memleak in l2tp_udp_encap_recv() (bsc#1257708).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23138: kABI: Preserve values of the trace recursion bits (bsc#1258301).\n- CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed metadata size (bsc#1258305).\n- CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains (bsc#1258330).\n- CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (bsc#1258414).\n- CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in parse_longname() (bsc#1258337).\n- CVE-2026-23204: net: add skb_header_pointer_careful() helper (bsc#1258340).\n- CVE-2026-23215: x86/vmware: Fix hypercall clobbers (bsc#1258476).\n- CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (bsc#1258447).\n- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).\n- CVE-2026-23239: espintcp: Fix race condition in espintcp_close() (bsc#1259485).\n- CVE-2026-23240: tls: Fix race condition in tls_sw_cancel_work_tx() (bsc#1259484).\n- CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header processing (bsc#1259795).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc#1259891).\n- CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870).\n- CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (bsc#1259886).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion (bsc#1260009).\n- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).\n- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).\n- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).\n- CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter() (bsc#1260464).\n- CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file() (bsc#1260500).\n- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).\n- CVE-2026-23297: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit() (bsc#1260490).\n- CVE-2026-23304: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (bsc#1260544).\n- CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (bsc#1260735).\n- CVE-2026-23326: xsk: Fix fragment node deletion to prevent buffer leak (bsc#1260606).\n- CVE-2026-23335: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() (bsc#1260550).\n- CVE-2026-23343: xdp: produce a warning when calculated tailroom is negative (bsc#1260527).\n- CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry (bsc#1260732).\n- CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc#1260481).\n- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).\n- CVE-2026-23383: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing (bsc#1260497).\n- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).\n- CVE-2026-23393: bridge: cfm: Fix race condition in peer_mep deletion (bsc#1260522).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).\n- CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc#1261496).\n- CVE-2026-23419: net/rds: Fix circular locking dependency in rds_tcp_tune (bsc#1261507).\n- CVE-2026-23425: KVM: arm64: Fix ID register initialization for non-protected pKVM guests (bsc#1261506).\n- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).\n\nThe following non security issues were fixed:\n\n- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461).\n- KVM: x86: synthesize CPUID bits only if CPU capability is set (bsc#1257511).\n- Revert \"drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).\"\n- Update config files (bsc#1254307).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- bpf, btf: Enforce destructor kfunc type with CFI (bsc#1259955).\n- bpf: crypto: Use the correct destructor kfunc type (bsc#1259955).\n- btrfs: only enforce free space tree if v1 cache is required for bs \u003c ps cases (bsc#1260459).\n- btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() (bsc#1257777).\n- dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock (git-fixes).\n- drm/amdkfd: Unreserve bo if queue update failed (git-fixes).\n- drm/i915/display: Add module param to skip retraining of dp link (bsc#1253129).\n- drm/i915/dsc: Add Selective Update register definitions (stable-fixes).\n- drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters (stable-fixes).\n- firmware: microchip: fail auto-update probe if no flash found (git-fixes).\n- kABI: Include trace recursion bits in kABI tracking (bsc#1258301).\n- net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580).\n- nvme: add support for dynamic quirk configuration via module parameter (bsc#1243208).\n- nvme: expose active quirks in sysfs (bsc#1243208).\n- nvme: fix memory leak in quirks_param_set() (bsc#1243208).\n- powerpc/crash: adjust the elfcorehdr size (jsc#PED-11175 git-fixes).\n- powerpc/kdump: Fix size calculation for hot-removed memory ranges (jsc#PED-11175 git-fixes).\n- s390/cio: Update purge function to unregister the unused subchannels (bsc#1254214).\n- s390/ipl: Clear SBP flag when bootprog is set (bsc#1258175).\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: fnic: Add Cisco hardware model names (jsc#PED-15441).\n- scsi: fnic: Add and integrate support for FDMI (jsc#PED-15441).\n- scsi: fnic: Add and integrate support for FIP (jsc#PED-15441).\n- scsi: fnic: Add functionality in fnic to support FDLS (jsc#PED-15441).\n- scsi: fnic: Add headers and definitions for FDLS (jsc#PED-15441).\n- scsi: fnic: Add stats and related functionality (jsc#PED-15441).\n- scsi: fnic: Add support for fabric based solicited requests and responses (jsc#PED-15441).\n- scsi: fnic: Add support for target based solicited requests and responses (jsc#PED-15441).\n- scsi: fnic: Add support for unsolicited requests and responses (jsc#PED-15441).\n- scsi: fnic: Add support to handle port channel RSCN (jsc#PED-15441).\n- scsi: fnic: Code cleanup (jsc#PED-15441).\n- scsi: fnic: Delete incorrect debugfs error handling (jsc#PED-15441).\n- scsi: fnic: Fix crash in fnic_wq_cmpl_handler when FDMI times out (jsc#PED-15441).\n- scsi: fnic: Fix indentation and remove unnecessary parenthesis (jsc#PED-15441).\n- scsi: fnic: Fix missing DMA mapping error in fnic_send_frame() (jsc#PED-15441).\n- scsi: fnic: Fix use of uninitialized value in debug message (jsc#PED-15441).\n- scsi: fnic: Increment driver version (jsc#PED-15441).\n- scsi: fnic: Modify IO path to use FDLS (jsc#PED-15441).\n- scsi: fnic: Modify fnic interfaces to use FDLS (jsc#PED-15441).\n- scsi: fnic: Propagate SCSI error code from fnic_scsi_drv_init() (jsc#PED-15441).\n- scsi: fnic: Remove always-true IS_FNIC_FCP_INITIATOR macro (jsc#PED-15441).\n- scsi: fnic: Remove extern definition from .c files (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary debug print (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary else and unnecessary break in FDLS (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary else to fix warning in FDLS FIP (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary spinlock locking and unlocking (jsc#PED-15441).\n- scsi: fnic: Replace fnic-\u003elock_flags with local flags (jsc#PED-15441).\n- scsi: fnic: Replace shost_printk() with dev_info()/dev_err() (jsc#PED-15441).\n- scsi: fnic: Replace use of sizeof with standard usage (jsc#PED-15441).\n- scsi: fnic: Return appropriate error code for mem alloc failure (jsc#PED-15441).\n- scsi: fnic: Return appropriate error code from failure of scsi drv init (jsc#PED-15441).\n- scsi: fnic: Test for memory allocation failure and return error code (jsc#PED-15441).\n- scsi: fnic: Turn off FDMI ACTIVE flags on link down (jsc#PED-15441).\n- scsi: hisi_sas: Fix NULL pointer exception during user_scan() (bsc#1255687).\n- scsi: scsi_transport_sas: Fix the maximum channel scanning issue (bsc#1255687, git-fixes).\n- scsi: smartpqi: Fix memory leak in pqi_report_phys_luns() (git-fixes, jsc#PED-15042).\n- selftests/bpf: Use the correct destructor kfunc type (bsc#1259955).\n- selftests/powerpc: Suppress -Wmaybe-uninitialized with GCC 15 (bsc#1261669 ltc#212590).\n- tg3: Fix race for querying speed/duplex (bsc#1257183).\n- x86/platform/uv: Handle deconfigured sockets (bsc#1260347).\n","modified":"2026-04-29T18:23:57.904042Z","published":"2026-04-20T15:09:00Z","related":["CVE-2025-39998","CVE-2025-40253","CVE-2025-68794","CVE-2025-71239","CVE-2026-23072","CVE-2026-23103","CVE-2026-23120","CVE-2026-23125","CVE-2026-23138","CVE-2026-23140","CVE-2026-23187","CVE-2026-23193","CVE-2026-23201","CVE-2026-23204","CVE-2026-23215","CVE-2026-23216","CVE-2026-23231","CVE-2026-23239","CVE-2026-23240","CVE-2026-23242","CVE-2026-23243","CVE-2026-23255","CVE-2026-23262","CVE-2026-23270","CVE-2026-23272","CVE-2026-23274","CVE-2026-23277","CVE-2026-23278","CVE-2026-23281","CVE-2026-23292","CVE-2026-23293","CVE-2026-23297","CVE-2026-23304","CVE-2026-23319","CVE-2026-23326","CVE-2026-23335","CVE-2026-23343","CVE-2026-23361","CVE-2026-23379","CVE-2026-23381","CVE-2026-23383","CVE-2026-23386","CVE-2026-23393","CVE-2026-23398","CVE-2026-23413","CVE-2026-23414","CVE-2026-23419","CVE-2026-23425","CVE-2026-31788"],"upstream":["CVE-2025-39998","CVE-2025-40253","CVE-2025-68794","CVE-2025-71239","CVE-2026-23072","CVE-2026-23103","CVE-2026-23120","CVE-2026-23125","CVE-2026-23138","CVE-2026-23140","CVE-2026-23187","CVE-2026-23193","CVE-2026-23201","CVE-2026-23204","CVE-2026-23215","CVE-2026-23216","CVE-2026-23231","CVE-2026-23239","CVE-2026-23240","CVE-2026-23242","CVE-2026-23243","CVE-2026-23255","CVE-2026-23262","CVE-2026-23270","CVE-2026-23272","CVE-2026-23274","CVE-2026-23277","CVE-2026-23278","CVE-2026-23281","CVE-2026-23292","CVE-2026-23293","CVE-2026-23297","CVE-2026-23304","CVE-2026-23319","CVE-2026-23326","CVE-2026-23335","CVE-2026-23343","CVE-2026-23361","CVE-2026-23379","CVE-2026-23381","CVE-2026-23383","CVE-2026-23386","CVE-2026-23393","CVE-2026-23398","CVE-2026-23413","CVE-2026-23414","CVE-2026-23419","CVE-2026-23425","CVE-2026-31788"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202621352-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255687"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258340"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259461"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259955"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259997"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260459"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260497"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260522"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260544"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260606"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40253"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23193"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23216"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23242"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23243"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23262"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23297"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23326"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23335"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23361"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23381"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23383"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23386"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23393"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23413"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23414"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23419"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23425"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-31788"}],"schema_version":"1.7.5"}